Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Photo credit: Shutterstock The computer and the network that connects them are both inextricably linked to the success of any business.  This truth is at the heart of our contemporary connection economy. "The computer patiently measures and reports. [T]he network creates value in connection. The connection economy values the bridges between the nodes as much as the nodes themselves." - Seth Godin This train of thought explains why Uber is worth more than the independent cars it connects.  It also describes the imperative for enterprises to redefine their network in order to operate in the modern data economy.  The instantiation of today's data economy lies in the digital supply chain that links customer demand and organizational products. This reality surfaces the need for organizations to transform their supply chains into demand and product networks. This strate... (more)

Is Data Classification a Bridge Too Far? | @CloudExpo #API #Cloud #BigData

Today data has replaced money as the global currency for trade. “McKinsey estimates that about 75 percent of the value added by data flows on the Internet accrues to “traditional” industries, especially via increases in global growth, productivity, and employment. Furthermore, the United Nations Conference on Trade and Development (UNCTAD) estimates that about 50 percent of all traded services are enabled by the technology sector, including by cross-border data flows.” As the global economy has become fully dependent on the transformative nature of electronic data exchange, its participants have also become more protective of data’s inherent value. The rise of this data protectionism is now so acute that it threatens to restrict the flow of data across national borders. Data-residency requirements, widely used to buffer domestic technology providers from internation... (more)

New Horizons® Delivers CloudMASTER®

For over 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer courses and certifications. They are the world’s largest independent IT training company, with over 300 computer training centers in 70 countries (and counting). In a move to expand that lead, New Horizons is now proud to offer the complete suite of CloudMASTER programs, providing vendor-agnostic cloud training as the spearhead of their cloud curriculum. We are now living in a technology world governed by the advent of Digital Transformation – the inclusion of digital technology in all aspects of our lives and the ways in which businesses need to adjust to meet this reality. This is the messaging IT Professionals are hearing from all major technology vendors. No matter the details each vendor may use... (more)

CloudMASTER® Pays Well In The US Great Northwest

The City of Beaverton is located seven miles west of Portland, Oregon, in the Tualatin River Valley, It encompasses 19.6 square miles, and is home to more than 95,000 residents. The city is Oregon’s sixth largest and the second-largest incorporated city in Washington County. Located in the heart of Oregon’s “Silicon Forest”, it is also home to many of the world’s top companies such as Nike, IBM and Tektronix, and Micro Power Electronics. Beaverton is also where Carver Technology Consulting LLC (Carver TC) is making a name for itself in cloud computing. Over the past few years, CarverTC staff have increased their knowledge and experience with cloud services as more and more development projects involved cloud development, deployment, and integration. Simultaneously, they began providing support to its clients on planning and implementation of cloud software. In 2016 ... (more)

TAP Accelerates #ArtificialIntelligence | @CloudExpo #AI #BigData #Hadoop

Over the past few years, the use of artificial intelligence has expanded more rapidly than many of us could have imagined. While this may invoke fear and dread in some, these relatively new technology applications are clearly delivering real value to our global society.  This value is generally seen in four distinct areas: Efficiency - Delivering consistent and low-cost performance by characterizing routine activities with well-defined rules, procedures and criteria Expertise - augment human sensing and decision makingwith advice and implementation support based on historical analysis Effectiveness - improve the overall ability of workers and companies by improving coordination and communication across interconnected activities Innovation - enhance human creativity and ideation by identifying alternatives and optimizing recommendations. Photo credit: Shutterstock ... (more)

When Cloud and Cognitive Computing Merge | @CloudExpo #ML #Cloud #CognitiveComputing

Cognitive Business: When Cloud and Cognitive Computing Merge Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud Services Is Happening Faster Than Expected": "According to the sixth annual Uptime Institute Data Center Industry Survey, which examines the big-picture trends shaping IT infrastructure delivery and strategy, the move to cloud services is accelerating. The Uptime Institute's February 2016 poll of more than 1,000 data center and IT professionals predicts that an even faster shift to the cloud will occur over the next four years, reports ZDNet." Figure 1: ComputerWins on ‘Jeopardy!': Trivial, It's Not Another maybe even more im... (more)

[video] Technical Testing with @CoalfireSys | @CloudExpo #Cloud #Security #FedRAMP

"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The World's Largest "Cloud Digital Transformation" Event @CloudExpo / @ThingsExpo 2017 New York (June 6-8, 2017, Javits Center, Manhattan) @CloudExpo / @ThingsExpo 2017 Silicon Valley (Oct. 31 - Nov. 2, 2017, Santa Clara Convention Center, CA) Full Conference Registration Gold Pass and Exhibit Hall ▸ Here Register For @CloudExpo ▸ Here via EventBrite Register For @ThingsExpo ▸ Here via EventBrite Register For @DevOpsSummit ▸ Here via EventBrite Sponsorship Opportunities Sponsors of Cloud Expo / @ThingsExpo wil... (more)

Smart Manufacturing Is Cloud Computing | @CloudExpo #IoT #Cloud #DigitalTransformation

As cloud computing simultaneously transforms multiple industries many have wondered about how this trend will affect manufacturing. Often characterized as "staid," this vertical is not often cited when leading edge technological change is the topic. This view, however, fails to address the revolutionary nexus of cloud computing and the manufacturing industry. Referred to as Digital Thread and Digital Twin; these cloud driven concepts are now driving this vertical's future. Digital Thread is a communication framework that connects traditionally siloed elements in manufacturing processes in order to provide an integrated view of an asset throughout the manufacturing lifecycle. Digital thread implementation also requires business processes that help weave data-driven decision management into the manufacturing culture. A Digital Twin is a virtual representation of a man... (more)

Business Chatbots Taking Over | @CloudExpo #AI #ML #IoT #M2M #Cloud

Chat apps characteristics make them very appealing to businesses and marketers. Prominent ones include their size, user retention, usage rates, and user demographics. In fact, the combined user base of the top four chat apps is larger than that of the top four social networks. Chat apps also have higher retention and usage rates than most mobile apps. Finally, the majority of their users are young, an extremely important demographic for brands, advertisers and publishers. These chat app traits have accelerated the blending of artificial intelligence and business service functions to create the modern chatbot. Recent advances in this area include: A chatbot's ability to conduct engaging human conversations which has allowed businesses to leverage the inexpensive and wide-reaching technology to engage with more consumers; The greater suitability of chatbots with mobil... (more)

For Top Cyber Threats, Look in the Mirror | @CloudExpo #Cloud #Analytics #Cybersecurity

A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevalent threats to corporate data.  The amazing thing about these weaknesses is that the top four are all based on utilizing stolen credentials and the last one helps an attacker be more effective in using those stolen credentials.  In other words, the enemy is right there in the mirror!  The study spanned 75 unique organizations and only focused on security weaknesses that were used to obtain a full network compromise. Where are your pain points? The most prevalent threat is something we've all heard of before - Weak Domain User Passwords. Since most corporate environments use Microsoft's... (more)

Cybersecurity in the President Trump Administration

From the rise of increasingly capable nation-states—like Iran and North Korea—conducting destructive attacks against American private sector companies, to the continuing pace of IP theft by China striking at the very heart of our innovation economy, the new team at the White House will have its hands full. And this doesn’t even account for ongoing efforts to infiltrate critical infrastructures by nation-state proxies and efforts to influence political, economic, and military conditions in the United States through cyber-enabled intelligence. Or recruitment activities, the reality of our aging federal cyber infrastructure, and the lack of serious federal government policies on joint public-private cyber defense and cyber deterrence.Jamil JafferCyber, Nat'l Security, Foreign PolicyGiven this dizzying list of challenges, the likely limited bandwidth to address these ... (more)