Market Reports Online, Thursday, November 06, 2014
Netscribes' latest market research report titled Cloud Computing Market in China 2014 captures the current scenario of the Cloud Computing Market in China. Government initiatives and investments coupled with major foreign players entering into strategic partnerships with the domestic vendor is propelling the market in China. Additionally, dramatic cost reduction along with increased speed and flexibility and widespread use of internet is helping the cloud industry to grow significantly. As the cloud market in China is still in the growth stage, major foreign players like IBM and Microsoft are aiming to capture a lion's share of the market.
Warwick Ashford, Computer Weekly, Thursday, November 06, 2014
The UK government has joined forces with the insurance industry to improve how UK businesses manage cyber security risk. The initiative builds on the government’s 10 Steps to Cyber Security guidance on managing cyber risk; and the Cyber Essentials Scheme to ensure basic cyber hygiene as part of the UK Cyber Security Strategy. The government believes working with the insurance industry to develop a comprehensive cyber security insurance model is the next step to encouraging private-sector firms to manage cyber risk.
City News Service, LA Daily News, Tuesday, November 04, 2014
Los Angeles Police Department officials said Tuesday they plan to move forward with using body cameras on its officers, choosing to go with Taser, which offers a cloud-based video storage system.
Bob Brewin, Nextgov, Tuesday, November 04, 2014
Mark S. Orndorff, the mission assurance executive for the Defense Information Systems Agency, said three commercial cloud services are currently available to DOD users: Autonomic Resources, CGI Federal and Amazon Web Services. Assessments of FedRAMP-compliant offerings from providers such as Hewlett-Packard, Lockheed Martin, AT&T, Akamai, Microsoft, Oracle and a cloud solution offered by the Agriculture Department are underway, he said.
European Commission, Thursday, October 30, 2014
More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA). In Cyber Europe 2014 experts from the public and private sectors including cyber security agencies, national Computer Emergency Response Teams, ministries, telecoms companies, energy companies, financial institutions and internet service providers are testing their procedures and capabilities against in a life-like, large-scale cyber-security scenario.
Infotech, Tuesday, October 28, 2014
Microsoft has announced a cloud platform that helps public safety departments meet Criminal Justice Information Services (CJIS) policies and connect to the FBI’s systems to securely access data. Law enforcement agencies adopting cloud platforms have concerns about meeting CJIS policies. Microsoft is addressing this concern by offering Microsoft Azure Government cloud, which helps these agencies address compliance obligations like CJIS. A number of Justice and Public Safety customers and partners of Microsoft are building new solutions on this platform, Microsoft said.
Brian Bartholomew, iSight Partners, Tuesday, October 28, 2014
Earlier today iSIGHT Partners proudly participated in the public disclosure of threat intelligence on a prolific Chinese Cyber Espionage group. This disclosure included the sharing of technical indicators which can be used to determine the potential of compromise, as well as detail on the tactics, techniques and procedures of this group which can be used to inform better security decisions. This release was made as part of a coalition of security vendors, security researchers and major technology companies called “Operation SMN” which was announced on October 14th. The effort was led by Novetta and Microsoft and is the first joint effort under Microsoft’s Coordinated Malware Eradication program.
Molly Bernhart Walker, FierceGovernmentIT, Wednesday, October 22, 2014
The National Institute of Standards and technology Oct. 21 published a final version of its U.S. Government Cloud Computing Technology Roadmap. The document lays out 10 requirements – each accompanied by "priority action plans" and target completion dates – necessary for cloud adoption by the federal government. The 10 specific requirements relate to the broader priorities of security, interoperability, portability, performance and accessibility.
Russia Direct, Tuesday, October 21, 2014
Russia and China could soon sign an agreement on cooperation in the field of cybersecurity, a move that some see as an attempt to reduce American influence in the information technology field.
Sean Gallagher, Ars Technica, Monday, October 20, 2014
GreatFire.org, a group that monitors censorship by the Chinese government’s national firewall system (often referred to as the “Great Firewall”), reports that China is using the system as part of a man-in-the-middle (MITM) attack on users of Apple’s iCloud service within the country. The attacks come as Apple begins the official rollout of the iPhone 6 and 6 Plus on the Chinese mainland. The attack, which uses a fake certificate and Domain Name Service address for the iCloud service, is affecting users nationwide in China. The GreatFire.org team speculates that the attack is an effort to help the government circumvent the improved security features of the new phones by compromising their iCloud credentials and allowing the government to gain access to cloud-stored content such as phone backups.