Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

NATO ACT 'Art of the Possible' Interoperability Demonstration GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an important demonstration for military, government and business leaders by its member-companies to underscore the benefits of collaborating via an interoperable network environment. The demonstration used a secure, federated-cloud infrastructure to highlight the consortium's work over the past few years in how to develop a trusted environment, including governance processes and federation management as well as interoperability verification. This demonstration itself is an outgrowth of  the NCOIC Interoperability Verification (IV)... (more)

TAP Accelerates #ArtificialIntelligence | @CloudExpo #AI #BigData #Hadoop

Over the past few years, the use of artificial intelligence has expanded more rapidly than many of us could have imagined. While this may invoke fear and dread in some, these relatively new technology applications are clearly delivering real value to our global society.  This value is generally seen in four distinct areas: Efficiency - Delivering consistent and low-cost performance by characterizing routine activities with well-defined rules, procedures and criteria Expertise - augment human sensing and decision makingwith advice and implementation support based on historical analysis Effectiveness - improve the overall ability of workers and companies by improving coordination and communication across interconnected activities Innovation - enhance human creativity and ideation by identifying alternatives and optimizing recommendations. Photo credit: Shutterstock ... (more)

The BYOD Problem | @CloudExpo #Cloud #Mobile #Security

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on "Bring Your Own Device" (BYOD). The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. These employee related drivers are considered more important than reduced costs (47%). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi. Security threats to BYOD... (more)

Business Chatbots Taking Over | @CloudExpo #AI #ML #IoT #M2M #Cloud

Chat apps characteristics make them very appealing to businesses and marketers. Prominent ones include their size, user retention, usage rates, and user demographics. In fact, the combined user base of the top four chat apps is larger than that of the top four social networks. Chat apps also have higher retention and usage rates than most mobile apps. Finally, the majority of their users are young, an extremely important demographic for brands, advertisers and publishers. These chat app traits have accelerated the blending of artificial intelligence and business service functions to create the modern chatbot. Recent advances in this area include: A chatbot's ability to conduct engaging human conversations which has allowed businesses to leverage the inexpensive and wide-reaching technology to engage with more consumers; The greater suitability of chatbots with mobil... (more)

Should Data Centers Think? | @CloudExpo #Cloud #Agile #Analytics #DataCenter

As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data center management.  According to industry research firm IDC, organizations will spend an additional $142.8 billion oninfrastructure for both public and private cloud environments in the next three years (2016-2018) to boost efficiency and business agility. To support this rapid evolving space, Intel announced a “Cloud for All” initiative last year in order to help businesses get the most out of their cloud infrastructure. Specific goals for this initiative include: Investing in the ecosystem to accelerate enterprise-ready, easy-to-deploy software defined infrastructure (SDI) solutions; Op... (more)

The Enterprise Network | @ThingsExpo #IoT #M2M #DigitalTransformation

Photo credit: Shutterstock The computer and the network that connects them are both inextricably linked to the success of any business.  This truth is at the heart of our contemporary connection economy. "The computer patiently measures and reports. [T]he network creates value in connection. The connection economy values the bridges between the nodes as much as the nodes themselves." - Seth Godin This train of thought explains why Uber is worth more than the independent cars it connects.  It also describes the imperative for enterprises to redefine their network in order to operate in the modern data economy.  The instantiation of today's data economy lies in the digital supply chain that links customer demand and organizational products. This reality surfaces the need for organizations to transform their supply chains into demand and product networks. This strate... (more)

The Path to Your Future | @CloudExpo #AI #ML #Cloud #DigitalTransformation

NCTA CloudMASTER®: The Path to Your Future In 2016, cloud computing started to dominate many IT market segments. As a business, Synergy Research Group reported that industry revenue for the four quarters ended Sept. 30 grew 25%. Operator and vendor revenue for six segments of cloud computing reached $148 billion during that period, with spending on private clouds accounting for over half the total but spending on the public cloud growing much more rapidly. As more and more companies are taking advantage of the benefits of moving to cloud services, there is a significant need for IT professionals to gain the skills needed to successfully use and implement a wide range of cloud services, making typical vendor-focused training solutions less valuable. This NCTA program was designed to provide IT professionals with a strong foundation in cloud technologies, and overall c... (more)

When Cloud and Cognitive Computing Merge | @CloudExpo #ML #Cloud #CognitiveComputing

Cognitive Business: When Cloud and Cognitive Computing Merge Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud Services Is Happening Faster Than Expected": "According to the sixth annual Uptime Institute Data Center Industry Survey, which examines the big-picture trends shaping IT infrastructure delivery and strategy, the move to cloud services is accelerating. The Uptime Institute's February 2016 poll of more than 1,000 data center and IT professionals predicts that an even faster shift to the cloud will occur over the next four years, reports ZDNet." Figure 1: ComputerWins on ‘Jeopardy!': Trivial, It's Not Another maybe even more im... (more)

Quantum Computing Delivered from the Cloud | @CloudExpo #AI #ML #DL

IBM Cloud is now providing developers with the infrastructure and portal to a 5 qubit quantum computer. This equips them with the ability to build interfaces between classic computers and IBM's quantum platform. Quantum computers make direct use of quantum-mechanical phenomena, such as superposition and entanglement to perform operations on data. Quantum computers are different from binary digital electronic computers based on transistors. Whereas common digital computing requires that the data be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits, which can be in superpositions of states. IBM also announced today: The release of a new API (Application Program Interface) for the IBM Quantum Experience that enables developers and programmers to begin building interfaces between it... (more)

Cloud Computing Forensics Readiness | @CloudExpo #API #Cloud #Security

In today's globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have been compromised. As organizations rapidly move into the cloud, the complexities of this multi-jurisdictional and multi-tenancy environment has made the importance of cloud forensics even more pronounced. This reality has also drastically heightened the legal risk associated with information technology operations. Cloud and digital forensics readiness are therefore critical to business disaster recovery, continuity of business services and cloud ecosystem management. The benefits of digital forensic readiness include: Reducing the cost of cyber investigations; Quick determination of re... (more)

Both Sides of Enterprise Mobility | @CloudExpo #Cloud #Mobile #DigitalTransformation

Enterprise mobility has become table stakes in the world of business. The ability to access current information at any time, from anywhere, on any device has really become a cliché. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty of developing and executing an effective corporate mobile strategy.  This reality is driven by the fact that companies must actually have two mobile strategies. The first face of mobility is an inside strategy focused on supporting employees and business partners. From this viewpoint, mobility becomes the central point of access and the management tool for corporate information and intelligence. The organizational goal here is to introduce context to business processes in order to offer viable options and drive better decisions. An additional benefit of this capability is to create fr... (more)