After BlackBerries, What's Next For Government Mobile Users?

Doug Miller by Doug Miller, Milltech Consulting
Friday, August 31, 2012

Research in Motion's BlackBerry phones have historically been the device of choice for secure mobile communication in the government market. BlackBerries offered unique business-oriented capabilities but lacked sex appeal to draw consumers to its products. Yet for government agencies that needed to supply their workers with a robust, secure cell phone, the business features won out over giving users a device that was "magical."

Navigating the 'unholy' matrimony of mobile and cloud

(ISC)2 Government Advisory Board Executive Writers Bureau, Government Computer News,  Friday, August 31, 2012

Chief information security officers (CISOs) are increasingly faced with pressure to adapt existing security paradigms and practices to facilitate emerging technology revolutions that fuel business innovation and citizen services. This is exemplified by the rise of smarter mobile devices with access to corporate data driven by the explosion of consumerized IT and the confluence of cloud-delivered services. As a result, a new framework for the underlying security model must be established in order to securely enable essential enterprise/citizen interactions.

FedRAMP certification eases government customers into the cloud

Gina Narcisi, SearchCloudProvider,  Thursday, August 30, 2012

Cloud computing has always been a tough sell with both federal and local government agencies. Plagued by regulatory compliance requirements and high-stakes security concerns, these customers loathe moving sensitive data into a cloud provider's data center, where compute and storage resources are typically shared among customers.

Chip encrypts Android calls, without the lag time

John Breeden II, Government Computer News,  Thursday, August 30, 2012

Quick quiz: What’s the most important thing that should be on all federal employees' minds when they leave the office? The answer, as I’m sure most of you guessed, is security. The government spends a lot of time and money buidling digital fortresses around its offices, but they are of little help once a fed walks outside, where a simple phone call can be the key to undermining all those efforts.

GSA issues cloud email blanket purchase agreements

Joseph Marks, NextGov,  Thursday, August 30, 2012

The government has entered into a blanket purchase agreement with 17 cloud email providers, a move that will likely spur a number of agencies to switch to the Internet-based email systems, the General Services Administration announced Thursday. The 17 vendors will offer five different cloud email systems, a GSA official said. They are Google, Microsoft 365, Microsoft Exchange, Domino Web, an IBM system, and Zimbra, an open source system.

DMTF spec simplifies cloud management

Rutrell Yasin, Government Computer News,  Wednesday, August 29, 2012

The Distributed Management Task Force has released a new specification designed to simplify cloud infrastructure management and ensure that workloads can be easily moved among different cloud environments.

U.S. Intelligence Agencies Seek A Private Cloud OS

Patience Wait, InformationWeek Government,  Wednesday, August 29, 2012

In-Q-Tel, the investment arm of the CIA, has partnered with cloud management specialist Adaptive Computing to develop a "cloud operating system" for use by U.S. intelligence agencies. Adaptive will integrate its Moab cloud management suite with an unspecified open source cloud platform--potentially OpenStack, CloudStack, or another alternative--to create the cloud OS.

How Following Cybersecurity Standards Saves Money

Henry Kenyon, AOL Government,  Wednesday, August 29, 2012

Cybersecurity is on the top of many public and private sector IT agendas these days. But while organizations focus on the software and hardware to police networks, they often don't consider the standards necessary to have all those defenses working together, or the possible cost savings that can be achieved through improved cybersecurity.

How Secure Is the Cloud, Really?

Richard Adhikari, TechNewsWorld,  Tuesday, August 28, 2012

Cloud security skeptics were given yet another reason to doubt the fortitude of online storage when the strange tale of Mat Honan emerged earlier this month. Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life.

White House plans to regulate contractor computer security

Aliya Sternstein, Nextgov,  Monday, August 27, 2012

The Obama administration has drafted plans to require federal contractors to adopt specific cybersecurity safeguards for company equipment that transmits government information.The proposed regulations come as the White House considers issuing an executive order that would regulate computer security at all critical businesses. Industry backlash stopped Congress from mandating such reforms.