It is time to change the rules, and hold federal IT organizations accountable for their missteps. The OPM breach, which the Obama administration says was the work of Chinese hackers, exposes every current and former federal employee to blackmail, identity theft, phishing attacks, espionage and unto...
SafeGov.org is a forum for IT providers and leading industry experts dedicated to promoting trusted and responsible cloud computing solutions for the public and private sectors.
Ensuring the transition to the cloud is done right is paramount. Read what's at stake.
Thursday, July 02, 2015
Wednesday, July 01, 2015
The Office of Personnel Management's Electronic Questionnaires for Investigations Processing system is offline now after the agency says it found a security vulnerability. The site will be offline for four to six weeks. OPM hasn't said the discovery came out of the 30-day cyber sprint called for by...
Friday, June 26, 2015
FedRAMP is charged with standardizing security assessments for cloud systems across government. While underappreciated, these standardization efforts are vital to improving the security of government data. ...
Friday, June 19, 2015
Measuring a problem is a first step to solving it. Many, myself included, have identified problems with the “Mutual Legal Assistance Treaty” (MLAT) system used by one country to retrieve admissible criminal evidence stored in another. Based on formal international agreements, a country needing ev...
Thursday, June 18, 2015
Is America as authoritarian as China? Surely not. And yet sometimes the differences can be hard to discern. A case in point is their similar approaches to one aspect of criminal law, the lawful intercept rules for telecommunications; approaches that a new study by the American Enterprise Institute...
News & Commentary
Monday, July 27, 2015
The head of the FBI has spent the last several months in something of a panic, warning anyone who will listen that terrorists are “going dark”—using encrypted communications to hide from the FBI—and insisting that the bureau needs some kind of electronic back door to get access to those chats. It’s...
Saturday, July 25, 2015
The Defense Information Systems Agency on July 24 issued three new documents targeting cloud security, including two new requirements guides and a new concept of operations. The three new documents more thoroughly define cloud security and the steps to achieving it, outlining the responsibilities ...
Friday, July 24, 2015
Podcast: Do warrants allow law enforcement to reach into data centers across borders? Can 19th-century international legal processes keep up with 21st-century speed? Join us for a briefing on the law and policy that determines the reach of law enforcement into data stored outside of the United Stat...
Friday, July 24, 2015
The ready solution is a statutory fix that treats these two scenarios differently. U.S. companies should have to comply with U.S. warrants for U.S. persons even when they put data on servers abroad. At the same time, U.S. warrants should not be used to access foreign-stored files of foreign users e...
Thursday, July 23, 2015
And in the struggle between security and privacy, there can be no security without privacy. But what good is privacy without security? In 1986, when electronic and digital information was in its infancy, Congress passed the Electronic Communications Privacy Act (“ECPA”) to extend the age old prote...