Sean Lyngaas, FCW, Thursday, November 13, 2014
Awareness of the big-data phenomenon – the deluge of information uncorked by the connectivity of devices – is not the problem. According to the study, which surveyed 152 federal and 153 private-sector attorneys, IT executives, FOIA agents and records managers, the real challenge is finding an effective strategy to deal with it all.
Thursday, November 13, 2014
When you actually stop to think about its reach into our activities, behaviors and movement, it is undeniable that technology is ingrained in our daily lives. And it brings us immense benefits, including personalized services and conveniences that connect people across continents and enrich our lives. Moreover, such data -- part of an ever-growing record of everyone's online activity -- has also begun to be used by police and law enforcement agencies to solve crimes. But as our digital footprints grow in volume and complexity, what controls do we have in place to protect our privacy and secure our records from unauthorized access?
Bailey McCann, CivSource, Thursday, November 13, 2014
A new study from LexisNexis shows widespread use of social media by law enforcement for criminal investigations and crime prevention, but few have an established policy. According to the study eight out of ten law enforcement officials use social media for criminal investigations. A full 67% of respondents said they also agree that social media is an effective tool for crime anticipation.
Mary Madden, Pew Research, Wednesday, November 12, 2014
Privacy evokes a constellation of concepts for Americans—some of them tied to traditional notions of civil liberties and some of them driven by concerns about the surveillance of digital communications and the coming era of “big data.” While Americans’ associations with the topic of privacy are varied, the majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.
Lynn Langit, Gigaom, Monday, November 10, 2014
Enterprise IT infrastructure largely predates the emergence of cloud computing as a viable choice for hosting data-driven applications. Large organizations are now showing real signs of adopting cloud computing for certain applications and a few forward-thinking enterprises are formulating the concept of data as a service, based on performing big-data analytics in the cloud. However, exactly when big-data analytics will move to the cloud remains an open question.
Tim Brugger, The Motley Fool, Monday, November 10, 2014
Even as Google and Amazon.com continue to wage war on each other, scratching and clawing their way to expanding their respective cloud hosting client bases, Microsoft is going about its cloud computing efforts in a slightly different fashion. The back-and-forth between the two cloud behemoths -- including Google's recent cloud services upgrades and yet another price cut, which was then matched by Amazon's unlimited photo storage offer -- is great news for Microsoft fans. Why? Because Microsoft's figured out the real opportunity to generate cloud revenues isn't hosting, that's already a commoditized business. Delivering its suite of software products via the cloud, and continuing to add solutions and delivery channels via strategic partnerships is where Microsoft CEO Satya Nadella is focusing his efforts, just as he should.
Tracy Mitrano, Inside Higher Ed, Sunday, November 09, 2014
Loosely compared, the F.T.C. may be at a similar place where the F.C.C. was ten years ago. Persistent challenges exist in cloud computing for the education sector to protect student privacy and comply with FERPA while still taking advantage of the opportunities for effectiveness and efficiencies that cloud computing offers. Market dominance of Google in particular, its contracts by URL and picking school districts and colleges and universities off one by one with non-disclosure agreements, its circular reasoning in policies about not displaying “ads” in order to data mine for the furtherance of its own profitable business practices places the education community, as well as libraries and government, in a compromised position from which it cannot rely on the market alone to get out. In addition to the grossly unfair bargaining power, the smoke and mirrors of technological and business practices that to most people are translucent at best, it has silenced the CIO community which fear for their own jobs to raise say much about it. In short, technology and the market have outstripped the law and social norms about privacy with the not-for-profit sector in the bull’s eye of the target.
Taylor Armerding, CSO, Wednesday, November 05, 2014
Cyber security, to be successful, has to be a “team sport,” former Homeland Security secretary Michael Chertoff told attendees of the Advanced Cyber Security Center (ACSC) Conference at the Federal Reserve Bank of Boston Tuesday morning. Chertoff, cofounder and executive chairman of the Chertoff Group, who gave the keynote speech at the conference, titled “Left of Boom: How and where to invest across the kill chain,” said organizations that go it alone, and especially those that focus only on prevention to maintain their security from cyberattacks are “doomed.”
GCN, Wednesday, November 05, 2014
Routine, unsanctioned file sharing among employees has put organizations at risk equal to or greater than the dangers posed by direct data theft, according to research by the Ponemon Institute and IntraLinks Holdings Inc., a software-as-a-service content management firm. The report, Breaking Bad: The Risk of Unsecure File Sharing, says many organizations have few controls in place to protect data, yet they are enabling data to be shared outside their organizations without the knowledge of senior management. The study points a finger at cloud storage and sharing services such as Dropbox, which have become increasingly popular as they enable employees and organizations to easily collaborate.
Dibya Sarkar, FierceGovernmentIT, Wednesday, November 05, 2014
A federal regulatory body is discussing a rule change Nov. 5 that would allow the FBI to conduct electronic surveillance of devices wherever they're located. The Advisory Committee on Criminal Rules is expected to hear from technology experts and privacy advocates about the the change to Rule 41 of the Federal Rules of Civil Procedure. The proposed change would help investigators conduct searches "by remotely installing software on a large number of affected victim computers pursuant to one warrant issued by a single judge," according to a May 5 memo to the Committee on Rules of Practice and Procedure. It would remove any geographical limitations of search warrants for computer investigations. The current rule requires investigators to obtain warrants in each of the districts where an affected computer may be located. However, civil liberties groups maintain that the rule change would vastly expand government powers and make the public more vulnerable to cyber attacks.