Omer Tene, IAPP, Tuesday, February 03, 2015
If you haven’t already read the speech that Federal Trade Commission (FTC) Bureau of Consumer Protection (BCP) Director Jessica Rich gave last week at an advertising industry meeting, take the time to do it now. Direct, sharp and concise, it maps out the state of play at the intersection of technology, law and policy, and charts a path for businesses that wish to avoid legal trouble not only with the powerful federal regulator but also with state attorneys general, class-action plaintiffs and European privacy authorities.
David Linthicum, InfoWorld, Tuesday, February 03, 2015
The reality is if you move to a multinational cloud provider, such as Amazon Web Services, Google, or Microsoft, the ability to secure the data depends on the processes and technology. If you think it's sufficient to leave data on servers where you happen to know the physical address, you’re fooling yourself. However, IT organizations tend to think in primitive ways when it comes to data security. If it’s local, it’s safe; if it’s remote, it’s not secured. But in recent years, local server safety has proven to be only a myth. Go ask Sony Pictures, Home Depot, and Target.
Diaz Ayub, Cloud Tweaks, Monday, February 02, 2015
In the previous two articles we spoke about “Enabling Virtualised Banking Environments” and “cloud and regulations in financial services” which mostly represented a view from the perspective of the financial institution and rarely from that of the service provider. For this reason, throughout this article we will be focusing on showing how the Cloud also creates a whole new world of opportunities for specialist service providers.
Kenneth Corbin, CIO, Friday, January 30, 2015
Speaking at a cloud event geared for private-sector firms, Terry Halvorsen, acting CIO at DoD, outlined his vision "to form an interactive partnership between all of the government players involved within DoD and industry to get it right." "We are going to continue to move more into the commercial space," Halvorsen says. "One of the questions that we're wrestling with today inside the DoD technology is what businesses should we be in, and how much of any business should we be in."
Jared Serbu, Federal News Radio, Wednesday, January 28, 2015
When it comes to compliance with federal mandates for more secure IT access procedures, such as two-factor authentication, the Defense Department has led the way in many respects, including by rolling out public key infrastructure (PKI) across most of its systems. But it has not moved fast enough. As a Pentagon report noted last week, DoD "red teams" — performing the roles of real-world cyber attackers — succeeded in using stolen passwords as one of their main entry points into the networks they were testing. Put differently, an awful lot of mission-critical DoD systems still use authentication procedures that are roughly as strong as an average user's Gmail account.
Joe McKendrick, Forbes, Monday, January 26, 2015
The U.S. federal government took a leadership role early with cloud. In fact, since 2010, federal agencies have been under a mandate to adopt a “cloud-first” approach to setting up new applications. So, there’s a lot that can be learned from the experiences of these agencies. For starters, there’s been an innate fear of lock-in to cloud vendors. In fact, 75 percent of federal cloud users in a new survey say they want to move more services to the cloud, but are concerned about retaining control over their data. Additionally, 53 percent say fear of long-term contracts hold them back.
Laurie Sullivan, Media Post, Friday, January 23, 2015
Dependency on cloud computing, outsourcing requirements and interconnected devices will eventually force the advertising industry to follow comprehensive security controls and practices to reduce the risk of data breaches. More than 90% of the 500 data breaches that occurred from January to June 2014 could have easily been prevented, per a report released Wednesday from The Online Trust Alliance (OTA).
Kevin Desouza and Gregory Dawson, Brookings, Tuesday, January 20, 2015
Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing.
Allan Leinwand, Tech Radar, Thursday, January 15, 2015
While the public cloud wars continue to rage among Google, Amazon and Microsoft, over the course of this year, we're likely to see a quiet storm gathering around cloud platforms. Cloud platforms are typically less well understood architecture but serve as a growing greenfield for enterprise innovation, application creation and business agility. Why is the platform coming into its own? Look at these milestones concerning domain maturity and growth...
MoneyControl.com, Friday, January 09, 2015
Given the distributed nature of public and hybrid clouds, financial services do have genuine concerns: where is the data hosted, to/through which countries is it transmitted, and how is its privacy going to be enforced in each place? Setting up local data centers will go far enough in addressing this data sovereignty issue. This year, Microsoft plans to offer commercial cloud services from local datacenters in India.