Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Everyone has heard of the 50 Shades of Grey. But do you know the "36 Shades of Hybrid IT"? These shades are a new way of describing the 36 point solutions across a hybrid IT environment. Enterprises looking to transform the way information technology is leveraged should evaluate their options by analyzing a transition across three specific high-level domains and their relevant sub-domains, namely: IT Implementation Model Traditional Managed Service Provider Cloud Service Provider Technology Service Model Infrastructure-as-a-Service Platform-as-a-Service Software-as-a-Service Deployment Model Private Hybrid Community Public Combinatorically (3 IT Models x 3 Service Models x 4 Deployment Models = 36 options) these components are used to identify the "36 Shades of Hybrid IT". These domains and sub-domain outline a structured decision process that aims to place the rig... (more)

Should Data Centers Think? | @CloudExpo #Cloud #Agile #Analytics #DataCenter

As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data center management.  According to industry research firm IDC, organizations will spend an additional $142.8 billion oninfrastructure for both public and private cloud environments in the next three years (2016-2018) to boost efficiency and business agility. To support this rapid evolving space, Intel announced a “Cloud for All” initiative last year in order to help businesses get the most out of their cloud infrastructure. Specific goals for this initiative include: Investing in the ecosystem to accelerate enterprise-ready, easy-to-deploy software defined infrastructure (SDI) solutions; Op... (more)

Digital Transformation Driven by ITaaS | @CloudExpo #Cloud #ITaaS #DigitalTransformation

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure. Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlow stands today as the d... (more)

How Quantum Computing with DNA Storage Will Affect Your Health | @CloudExpo #Cloud #Storage

How Quantum Computing with DNA Storage Will Affect Your Health By Guest Contributor Taran Volckhausen Contributing Editor at Vector Moore's Law, which states that processing speeds will double every two years as we cram more and more silicon transistors onto chips, has been faltering since the early 2000s when the law started to run up against fundamental limitations presented by the laws of thermodynamics. While the chip industry, with Intel leading the charge, has found ways to sidestep the limitations up until now, many are now saying that despite the industry's best efforts, the stunning gains in processor speeds will not be seen again by the simple application of Moore's Law. In fact, there is evidence to show that we are reaching the plateau for the number of transistors that will fit on a single chip. Intel has even suggested silicon transistors can only keep ... (more)

Cloud Computing Forensics Readiness | @CloudExpo #API #Cloud #Security

In today's globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have been compromised. As organizations rapidly move into the cloud, the complexities of this multi-jurisdictional and multi-tenancy environment has made the importance of cloud forensics even more pronounced. This reality has also drastically heightened the legal risk associated with information technology operations. Cloud and digital forensics readiness are therefore critical to business disaster recovery, continuity of business services and cloud ecosystem management. The benefits of digital forensic readiness include: Reducing the cost of cyber investigations; Quick determination of re... (more)

Both Sides of Enterprise Mobility | @CloudExpo #Cloud #Mobile #DigitalTransformation

Enterprise mobility has become table stakes in the world of business. The ability to access current information at any time, from anywhere, on any device has really become a cliché. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty of developing and executing an effective corporate mobile strategy.  This reality is driven by the fact that companies must actually have two mobile strategies. The first face of mobility is an inside strategy focused on supporting employees and business partners. From this viewpoint, mobility becomes the central point of access and the management tool for corporate information and intelligence. The organizational goal here is to introduce context to business processes in order to offer viable options and drive better decisions. An additional benefit of this capability is to create fr... (more)

Is Data Classification a Bridge Too Far? | @CloudExpo #API #Cloud #BigData

Today data has replaced money as the global currency for trade. “McKinsey estimates that about 75 percent of the value added by data flows on the Internet accrues to “traditional” industries, especially via increases in global growth, productivity, and employment. Furthermore, the United Nations Conference on Trade and Development (UNCTAD) estimates that about 50 percent of all traded services are enabled by the technology sector, including by cross-border data flows.” As the global economy has become fully dependent on the transformative nature of electronic data exchange, its participants have also become more protective of data’s inherent value. The rise of this data protectionism is now so acute that it threatens to restrict the flow of data across national borders. Data-residency requirements, widely used to buffer domestic technology providers from internation... (more)

NATO ACT 'Art of the Possible' Interoperability Demonstration

NATO ACT 'Art of the Possible' Interoperability Demonstration GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an important demonstration for military, government and business leaders by its member-companies to underscore the benefits of collaborating via an interoperable network environment. The demonstration used a secure, federated-cloud infrastructure to highlight the consortium's work over the past few years in how to develop a trusted environment, including governance processes and federation management as well as interoperability verification. This demonstration itself is an outgrowth of  the NCOIC Interoperability Verification (IV)... (more)

Surviving the Coming 'Hackerpocalypse' | @CloudExpo #API #Cloud #Security

With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse.  Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our survival will depend on society’s ability to deal with the evolution and maturation of the changing enterprise cybersecurity challenge. If you’re completely oblivious to the living dead threat, a zombie apocalypse refers to a widespread (usually global) rise of zombies hostile to human life.  The zombies will engage in a general assault on civilization where victims may become zombies themselves. This causes the outbreak to become an exponentially growing crisis. The spreading phenomenon swamps normal military and law enforcement organizations, leading to the panicked collapse of civili... (more)

What Is Your 2017 Business Strategy? | @CloudExpo #Cloud #DigitalTransformation

End of year predictions in December are as predictable as tomorrow's sunrise, but a recent video on 2017 Technology Trends helped me really understand how important a digital transformation strategy is to just about any business executive. The CSC Town Hall conversation actually identified some of the specific tasks that today's corporate executive really need to address in the coming year. To enhance your opportunity for 2017 business success, your action item list should include: Reconfiguring both corporate front and back office operations for digital execution which is expected to reshape organizational structures, employee compensation models and every business' partner community; Preparing for intelligent machines advisory services to the enterprise that will drastically increase productivity and business competition; Leveraging the industrial internet, aka t... (more)

The BYOD Problem | @CloudExpo #Cloud #Mobile #Security

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on "Bring Your Own Device" (BYOD). The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. These employee related drivers are considered more important than reduced costs (47%). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi. Security threats to BYOD... (more)