Stephanie Kanowitz, GCN, Friday, November 14, 2014
The Boston Marathon bombings of 2013 and the Ferguson, Mo., police shooting case have made clear the important role of video in law enforcement. What’s muddier, however, is how police departments can store exponentially growing terabytes of data and how they can do so according to federal security policies. A new partnership between Microsoft and VIEVU, a body-wearable camera maker, aims to solve that problem. Now, at the end of their shifts, officers remove their cameras and transfer the video they took wirelessly or via a direct connection to VIEVU’s Veripatrol software. Veripatrol sends the information to Microsoft’s soon-to-be-released Azure Government Cloud, where it is stored in compliance with policy approved by the FBI’s Criminal Justice Information Services (CJIS) Division.
William Jackson, GCN, Friday, November 14, 2014
“Security controls need to be reexamined in the context of cloud architecture, scale, reliance on networking, outsourcing and shared resources,” the authors write. “For example, multi-tenancy is an inherent cloud characteristic that intuitively raises concern that one consumer may impact the operations or access data of other tenants running on the same cloud.” NIST says recommended priority action plans for cloud security are: •Continue to identify cloud consumer priority security requirements, on at least a quarterly basis. •Periodically identify and assess the extent to which risk can be mitigated through existing and emerging security controls and guidance. Identify gaps and modify existing controls and monitoring capabilities. •Develop neutral cloud security profiles, technical security attributes and test criteria. •Define an international standards-based conformity assessment system approach.
Sean Lyngaas, FCW, Thursday, November 13, 2014
Awareness of the big-data phenomenon – the deluge of information uncorked by the connectivity of devices – is not the problem. According to the study, which surveyed 152 federal and 153 private-sector attorneys, IT executives, FOIA agents and records managers, the real challenge is finding an effective strategy to deal with it all.
Thursday, November 13, 2014
When you actually stop to think about its reach into our activities, behaviors and movement, it is undeniable that technology is ingrained in our daily lives. And it brings us immense benefits, including personalized services and conveniences that connect people across continents and enrich our lives. Moreover, such data -- part of an ever-growing record of everyone's online activity -- has also begun to be used by police and law enforcement agencies to solve crimes. But as our digital footprints grow in volume and complexity, what controls do we have in place to protect our privacy and secure our records from unauthorized access?
Bailey McCann, CivSource, Thursday, November 13, 2014
A new study from LexisNexis shows widespread use of social media by law enforcement for criminal investigations and crime prevention, but few have an established policy. According to the study eight out of ten law enforcement officials use social media for criminal investigations. A full 67% of respondents said they also agree that social media is an effective tool for crime anticipation.
Mary Madden, Pew Research, Wednesday, November 12, 2014
Privacy evokes a constellation of concepts for Americans—some of them tied to traditional notions of civil liberties and some of them driven by concerns about the surveillance of digital communications and the coming era of “big data.” While Americans’ associations with the topic of privacy are varied, the majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.
Lynn Langit, Gigaom, Monday, November 10, 2014
Enterprise IT infrastructure largely predates the emergence of cloud computing as a viable choice for hosting data-driven applications. Large organizations are now showing real signs of adopting cloud computing for certain applications and a few forward-thinking enterprises are formulating the concept of data as a service, based on performing big-data analytics in the cloud. However, exactly when big-data analytics will move to the cloud remains an open question.
Tim Brugger, The Motley Fool, Monday, November 10, 2014
Even as Google and Amazon.com continue to wage war on each other, scratching and clawing their way to expanding their respective cloud hosting client bases, Microsoft is going about its cloud computing efforts in a slightly different fashion. The back-and-forth between the two cloud behemoths -- including Google's recent cloud services upgrades and yet another price cut, which was then matched by Amazon's unlimited photo storage offer -- is great news for Microsoft fans. Why? Because Microsoft's figured out the real opportunity to generate cloud revenues isn't hosting, that's already a commoditized business. Delivering its suite of software products via the cloud, and continuing to add solutions and delivery channels via strategic partnerships is where Microsoft CEO Satya Nadella is focusing his efforts, just as he should.
Tracy Mitrano, Inside Higher Ed, Sunday, November 09, 2014
Loosely compared, the F.T.C. may be at a similar place where the F.C.C. was ten years ago. Persistent challenges exist in cloud computing for the education sector to protect student privacy and comply with FERPA while still taking advantage of the opportunities for effectiveness and efficiencies that cloud computing offers. Market dominance of Google in particular, its contracts by URL and picking school districts and colleges and universities off one by one with non-disclosure agreements, its circular reasoning in policies about not displaying “ads” in order to data mine for the furtherance of its own profitable business practices places the education community, as well as libraries and government, in a compromised position from which it cannot rely on the market alone to get out. In addition to the grossly unfair bargaining power, the smoke and mirrors of technological and business practices that to most people are translucent at best, it has silenced the CIO community which fear for their own jobs to raise say much about it. In short, technology and the market have outstripped the law and social norms about privacy with the not-for-profit sector in the bull’s eye of the target.
Taylor Armerding, CSO, Wednesday, November 05, 2014
Cyber security, to be successful, has to be a “team sport,” former Homeland Security secretary Michael Chertoff told attendees of the Advanced Cyber Security Center (ACSC) Conference at the Federal Reserve Bank of Boston Tuesday morning. Chertoff, cofounder and executive chairman of the Chertoff Group, who gave the keynote speech at the conference, titled “Left of Boom: How and where to invest across the kill chain,” said organizations that go it alone, and especially those that focus only on prevention to maintain their security from cyberattacks are “doomed.”