Android accounts for 97 percent of all mobile malware

Carly Page, The Register,  Friday, June 26, 2015

The threat of malware on Google's Android mobile operating system continues to grow, with the number of malicious apps quadrupling in 2014. Typically, Android has proven the biggest victim of mobile malware, with the report noting that the operating system currently accounts for 97 percent of all mobile malware.

Isabelle Falque-Pierrotin: Privacy Needs to Be the Default, Not an Option

Mark Halper, WIRED,  Friday, June 26, 2015

Isabelle Falque-Pierrotin has a wake-up call for the world’s digital citizens: Beware of the tech giants lurking behind your screens and keyboards. Falque-Pierrotin—current head of France’s CNIL (National Commission on Informatics and Liberty) and the “Article 29 Working Party,” a group of European Union data-protection advocates—believes we are sleepily handing over personal data in droves without truly understanding the consequences. Comprehensive privacy protection should be an enforced requirement, she argues, not just an “opt-in” afterthought.

Congress shouldn't overlook FedRAMP funding in 2016 budget

Julie Anderson by Julie Anderson, AG Strategy Group
Friday, June 26, 2015

FedRAMP is charged with standardizing security assessments for cloud systems across government. While underappreciated, these standardization efforts are vital to improving the security of government data.

How Microsoft is courting law enforcement to its cloud

Jonathan Vanian, Forbes,  Thursday, June 25, 2015

Agencies are using Microsoft Azure, the name of its cloud computing platform, to store surveillance video, criminal records, fingerprint data, and even the footage from police body cameras. “Once we get our video onto the Azure platform we can aggregate it, we can learn from it, we can make the database proactive to tell us things,” Oakland Police Department Officer Dave Burke said in a statement.

Keys to secure cloud migration

Matthew McKenna, Federal Times,  Thursday, June 25, 2015

The difficulty of effectively implementing a security framework is making sure there are no major gaps between the framework and the technical and administrative controls used. One of the most common areas of disconnect between security intent and implementation is in the realm of privileged, encrypted access.

18F builds agile contract for agile development

Aaron Boyd, Federal Times,  Thursday, June 25, 2015

Solicitations close June 26 for 18F's agile delivery services blanket purchase agreement (BPA), which, when finished, will enable agencies to buy services for agile development projects in an agile way. The Agile BPA being piloted at 18F — a division of the General Services Administration created to help agencies with software development — will include some 20 vendors with a proven ability to facilitate rapid code development and deploy functional software through an iterative approach.

NSF wants to test-drive the cloud of the future

Amanda Ziadeh, GCN,  Thursday, June 25, 2015

The National Science Foundation is looking for projects that push the envelope on cloud computing. To help advance cloud technology, the NSF recently announced that its “future cloud” prototype environments are now available to help researchers "develop and experiment with novel cloud architectures ... [and] go beyond the use of existing commercial cloud offerings ... to influence such offerings in the future." The prototypes are part of the NSFFutureCloud initiative, which NSF announced in 2013 to help the academic research community explore resource sharing in clustered computing, virtualization and the interplay among applications architectures and the physical environment.

Will EU deem Google, Facebook and Twitter part of critical infrastructure?

Loek Essers and Peter Sayer, IDG News Service ,  Thursday, June 25, 2015

Pressure is mounting in the European Union to subject companies including Google, Twitter, eBay and Facebook to the same critical IT infrastructure security requirements as banks or energy networks. EU lawmakers want providers of essential services in industries including banking, health care, transport and energy to protect their networks from hackers, and to disclose data breaches to the authorities.

Law enforcment turning to Microsoft's cloud to keep their files secure: only service to comply with FBI's CJIS policy

Kellogg Brengel, WinBeta,  Wednesday, June 24, 2015

Microsoft is hoping that governments will rely on them for their cloud based needs as the technology company posted an article today detailing how Microsoft Azure Government is the "only hyper-scale cloud platform that is contractually committed to meeting the FBI’s [Criminal Justice Information Services security policy] requirements." Law enforcement agencies across the US might soon be looking to use Microsoft's Azure Government platform as the International Associate of Chiefs of Police, the largest organization of police leaders in the US, updated their guidelines to recommend that all cloud based storage of criminal justice information should comply with these very FBI's CJIS requirements.

Eight EU nations urge caution on Internet regulation

Julia Fioretti, Reuters,  Wednesday, June 24, 2015

Eight European Union nations including Britain, Ireland and Poland on Tuesday urged caution with regulating the Internet, as Brussels prepares a sweeping review of the behaviour of web giants that could see them subjected to new rules. In a letter to European Council President Donald Tusk, who will this week chair a meeting of the EU's 28 heads of state, the leaders of Britain, Ireland, Sweden, Estonia, Poland, Finland, Czech Republic and the Netherlands, said the EU should only regulate "where there is clear evidence to do so."