FTC’s Rich Lays a Roadmap for Responsible Data Practices

Omer Tene, IAPP,  Tuesday, February 03, 2015

If you haven’t already read the speech that Federal Trade Commission (FTC) Bureau of Consumer Protection (BCP) Director Jessica Rich gave last week at an advertising industry meeting, take the time to do it now. Direct, sharp and concise, it maps out the state of play at the intersection of technology, law and policy, and charts a path for businesses that wish to avoid legal trouble not only with the powerful federal regulator but also with state attorneys general, class-action plaintiffs and European privacy authorities.

No, Canada! You can't keep cloud storage local

David Linthicum, InfoWorld,  Tuesday, February 03, 2015

The reality is if you move to a multinational cloud provider, such as Amazon Web Services, Google, or Microsoft, the ability to secure the data depends on the processes and technology. If you think it's sufficient to leave data on servers where you happen to know the physical address, you’re fooling yourself. However, IT organizations tend to think in primitive ways when it comes to data security. If it’s local, it’s safe; if it’s remote, it’s not secured. But in recent years, local server safety has proven to be only a myth. Go ask Sony Pictures, Home Depot, and Target.

The Cloud And The Financial Services Industry

Diaz Ayub, Cloud Tweaks,  Monday, February 02, 2015

In the previous two articles we spoke about “Enabling Virtualised Banking Environments” and “cloud and regulations in financial services” which mostly represented a view from the perspective of the financial institution and rarely from that of the service provider. For this reason, throughout this article we will be focusing on showing how the Cloud also creates a whole new world of opportunities for specialist service providers.

CIO Outlines Cloud Environment Goals at Department of Defense

Kenneth Corbin, CIO,  Friday, January 30, 2015

Speaking at a cloud event geared for private-sector firms, Terry Halvorsen, acting CIO at DoD, outlined his vision "to form an interactive partnership between all of the government players involved within DoD and industry to get it right." "We are going to continue to move more into the commercial space," Halvorsen says. "One of the questions that we're wrestling with today inside the DoD technology is what businesses should we be in, and how much of any business should we be in."

Next step for DoD cybersecurity: Ditch passwords once and for all

Jared Serbu, Federal News Radio,  Wednesday, January 28, 2015

When it comes to compliance with federal mandates for more secure IT access procedures, such as two-factor authentication, the Defense Department has led the way in many respects, including by rolling out public key infrastructure (PKI) across most of its systems. But it has not moved fast enough. As a Pentagon report noted last week, DoD "red teams" — performing the roles of real-world cyber attackers — succeeded in using stolen passwords as one of their main entry points into the networks they were testing. Put differently, an awful lot of mission-critical DoD systems still use authentication procedures that are roughly as strong as an average user's Gmail account.

For Cloud Computing Guidance, Look To Washington (Seriously)

Joe McKendrick, Forbes,  Monday, January 26, 2015

The U.S. federal government took a leadership role early with cloud. In fact, since 2010, federal agencies have been under a mandate to adopt a “cloud-first” approach to setting up new applications. So, there’s a lot that can be learned from the experiences of these agencies. For starters, there’s been an innate fear of lock-in to cloud vendors. In fact, 75 percent of federal cloud users in a new survey say they want to move more services to the cloud, but are concerned about retaining control over their data. Additionally, 53 percent say fear of long-term contracts hold them back.

OTA Releases Guidelines On Privacy Assessment, Best Practices

Laurie Sullivan, Media Post,  Friday, January 23, 2015

Dependency on cloud computing, outsourcing requirements and interconnected devices will eventually force the advertising industry to follow comprehensive security controls and practices to reduce the risk of data breaches. More than 90% of the 500 data breaches that occurred from January to June 2014 could have easily been prevented, per a report released Wednesday from The Online Trust Alliance (OTA).

Getting IT Right? How State Governments are Approaching Cloud Computing

Kevin Desouza and Gregory Dawson, Brookings,  Tuesday, January 20, 2015

Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing.

Top five cloud trends for 2015: a new era of B2B innovation

Allan Leinwand, Tech Radar,  Thursday, January 15, 2015

While the public cloud wars continue to rage among Google, Amazon and Microsoft, over the course of this year, we're likely to see a quiet storm gathering around cloud platforms. Cloud platforms are typically less well understood architecture but serve as a growing greenfield for enterprise innovation, application creation and business agility. Why is the platform coming into its own? Look at these milestones concerning domain maturity and growth...

Digitally Speaking: The bank is where the customer is

MoneyControl.com,  Friday, January 09, 2015

Given the distributed nature of public and hybrid clouds, financial services do have genuine concerns: where is the data hosted, to/through which countries is it transmitted, and how is its privacy going to be enforced in each place? Setting up local data centers will go far enough in addressing this data sovereignty issue. This year, Microsoft plans to offer commercial cloud services from local datacenters in India.