Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Government Cyber Assurance
As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of con...
I've just had the opportunity to preview my good friend Melvin Greer's newest effort, "21st Century Leadership: Harnessing Innovation, Accelerating Business Success". Now in pre-release, this book highlights the compelling linkage between internet scale technology, advance business mod...
The NGA project began in late 2012 with Cycle One, during which the cloud infrastructure was defined and built. The NCOIC team established standards and processes, utilized best practices, and addressed potential problems such as ownership, bandwidth, latency, availability, access and ...
NBC 4 in Washington, DC highlighted government cloud computing today as part of their GovInnovate show. Below is just a taste of the informative public service they provided. Go to the NBC Washington video site for much more!
“Global spending on big data by organizations will exceed $31 billion in 2013, finds a new market forecast by ABI Research. The spending will grow at a CAGR of 29.6% over the next five years, reaching $114 billion in 2018. The forecast includes the money spent on internal salaries, pro...
For more than half a century, cloud computing has changed names more often than a Hollywood starlet. Utility computing. Time share. Thin client. SaaS. PaaS. IaaS. While concepts have been added and capabilities grown, cloud computing was no more invented by Amazon or other modern vend...
The latest reports surrounding the surveillance programs of the NSA and their International counterparts reveal that these agencies have been able to decode the encryption methods some enterprises and organizations use to keep their online data private. While these headlines are likel...
Enterprise technologists have been wrestling with a common challenge for years. Just like Vannever Bush described in 1945, the amount of data being created is growing faster than humans can analyze. We all seem more motivated to address this challenge, especially since fast fast analys...
Today, IT requirements are changing.  IT trends are moving towards centralized processing, exploding stores of data and always-on always available services. Economic realities in the federal space are driving new approaches even faster now, since centralized processing and services mak...
In my previous post (Cloud Data, Security, Privacy & Confidentiality/ The ISV Perspective) I talked about the increasing exposure of data, the changing landscape of data confidentiality and the need to shield data rather than retreat into – largely mythical -“safe heavens” of on prem...
Amazon has gone to the US Court of Federal Claims in Washington, DC, to get the CIA to follow through on the four-year $600 million cloud contract it was awarded earlier this year. IBM, which also bid for the contract, objected to Amazon getting it claiming price discrimination becaus...
On an almost daily basis, I'm approached for my views on "cloud computing technology". Although typically innocent in nature, I always cringe at the thought of enduring yet another hours long discussion over the existence of a "cloud computing business model". With this in mind, you c...
HyTrust, the cloud automation security company, has gotten a new funding and strategic pal in In-Q-Tel (IQT), the venture arm of the CIA and other American black ops. HyTrust said the undisclosed investment, which is supposed to tickle its technology at scale, was a direct result of ...
With Cloud Expo New York | 12th Cloud Expo [June 10-13, 2013] starting next week, here's a look at one of the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference coming up June 10-13 at the Jacob Javits Center in New Yor...
By Bob GourleyYou don’t have to convince government IT leaders of the smart new business models, efficiencies and performance enhancements available with cloud computing. Like IT professionals everywhere, federal technologists get it. But things are different in the federal commu...
What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys’ without blinking. But recent headline events – and a ‘biggie’ last year – have raised serious doubts about the ability of cryptographic keys to pr...
Despite the recent flood of high profile network breaches, hacking attempts are hardly new. In 1995, I was attending school in Helsinki when I discovered a password “sniffer” attack in our university network. In response, I wrote a program called the “secure shell” to safeguard informa...
The concept of "Just-in-Time" was pioneered in the manufacturing supply chain as a critical way to reduce costs by minimizing inventory. Implementing a just-in-time system that can handle unexpected demand is not a trivial undertaking. It requires the confluence of a number of discipli...
“Our common interest in open source solutions has enabled OSSI to put together an all-star team of Government, commercial and community partners,” said John Farrell of HP/Fortify, OSSI's volunteer chairman and Chief Information Security Officer, as OSSI named several new members to its...
There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those dea...
"Next-generation security must be built on automated and actionable intelligence that can be quickly shared to meet the demands of modern and evolving networks," said Nawaf Bitar, senior vice president and general manager, Security Business Unit, Juniper Networks, as Juniper today unve...
“This year we’ve seen enterprises turn increasingly to Dell Services to help modernize and adapt their IT environments to manage the growing challenges and opportunities presented by these disruptive forces," said Suresh Vaswani, president, Dell Services, as Dell's CEO Michael Dell use...
US Defense Secretary Leon Panetta said in a speech in New York City that America is facing a cyber Pearl Harbor that could result in the death of civilians and paralyze the country, scaring everybody out of their wits. He’s thinking about hacks on critical infrastructure, energy g...
CUPERTINO, Calif., Sept. 10, 2012 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704;TSE:4704), a global leader in cloud security and the fight against cybercrime, today released Trend Micro™ Titanium™ Internet Security 2013, a new family of security software that promises to consumer...
NJVC announces the release of NJVC SaaS Accelerate, a specialized infrastructure hosting and managed services offering designed to support the business needs of software-as-a-service (SaaS) providers.
Cyber attacks on government systems are increasing at an exponential rate. Over a three-year period, government agencies reported a 400-percent increase in attempted incursions into federal systems. While there is no current data on the number of attempts to compromise intelligence and...
The DoD recently released the department's formal cloud computing strategy. In the forward, DoD CIO Teresa Takai said that: "The DoD Cloud Computing Strategy has been expanded to address use of commercial cloud services in the Department's multi-provider enterprise cloud environment....
Cybercrime has taken a dangerous turn heralding the emergence of a new generation of attacks focused on corporate and government espionage. These attacks are targeted and persistent leading to leakage of vital state secrets and critical corporate data. These threats have been labeled a...
Maybe I’ll start doing an ‘Infographic Friday’ to go along with Lori’s F5 Friday.  This one comes to us from  Rasmussen College’s School of Technology and Design Cyber Security Program and shows the online risks and offers some good tips on how to better protect your co...
Government agencies in the United States and around the world are increasing their use of social media to enhance the quality of government services and to encourage more citizen engagement and dialog. When used properly, social media can build trust and develop more efficient communic...
In view of the the quick-moving push to modernize many national security and emergency preparedness (NS/EP) capabilities to be cloud based capabilities, the White House tasked the President's National Security Telecommunications Advisory Committee (NSTAC) to produce a report aimed at a...
The greatest source of potential use cases for technology is the user community. This is a great reason to attend events where customers are at the center of focus. This was what last month’s Splunk Live DC was like. Splunk is a very user-focused capability and when you create a ...
Here is today’s federal cybersecurity and information technology news: IBM and the Lawrence Livermore National Laboratory are working together on the Vulcan supercomputer to analyze data for developing new technologies in applied energy, green energy, manufacturing, data manageme...
Keylogging has taking center stage, and it now deserves our proper attention. After all, keyloggers have been identified as the #1 Global Threat to consumers, corporations and government agencies in the recent 2012 Verizon Data Breach Investigations Report. Symantec Corporation coined ...
While the benefits and value of the federal cloud computing policy can be debated, the world’s transition to cloud computing as an integral component of any IT infrastructure cannot be denied. The prudent government executive should, therefore, heed the lessons learned from the many pr...
The defense and intelligence communities are not immune to cloud computing. Arguably more than any other government agencies, their missions require a fabric of utility computing that scales on demand and enables self discovery and self-service access to secure, timely and relevant inf...
Cloud computing is a new approach in the provisioning and consumption of information technology (IT). While technology is a crucial component, the real value of cloud computing lies in its ability to enable new capabilities or in the execution of current capabilities in more efficient ...
(This is part 2 of the series entitled "Implementation of Cloud Computing Solutions in Federal Agencies" that first appeared on Forbes.com. This series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper will be available at NJVC.com starting Sep...
The New York Times revealed June 1st what many experts had already asserted regarding the United States role in the Stuxnet attack. While speculation of U.S. involvement complicated international relations on cyber conflict, an acknowledgement of U.S. involvement in a forum such as the...
This year at Splunk Live, CTOvision editor and Crucial Point CTO Bob Gourley provided a keynote on predicting the future of information technology, outlining some of his methods and what we can learn from each.