Cloud Computing Market in China 2014 (1)

Market Reports Online,  Thursday, November 06, 2014

Netscribes' latest market research report titled Cloud Computing Market in China 2014 captures the current scenario of the Cloud Computing Market in China. Government initiatives and investments coupled with major foreign players entering into strategic partnerships with the domestic vendor is propelling the market in China. Additionally, dramatic cost reduction along with increased speed and flexibility and widespread use of internet is helping the cloud industry to grow significantly. As the cloud market in China is still in the growth stage, major foreign players like IBM and Microsoft are aiming to capture a lion's share of the market.

UK government joins forces with insurers on cyber security

Warwick Ashford, Computer Weekly,  Thursday, November 06, 2014

The UK government has joined forces with the insurance industry to improve how UK businesses manage cyber security risk. The initiative builds on the government’s 10 Steps to Cyber Security guidance on managing cyber risk; and the Cyber Essentials Scheme to ensure basic cyber hygiene as part of the UK Cyber Security Strategy. The government believes working with the insurance industry to develop a comprehensive cyber security insurance model is the next step to encouraging private-sector firms to manage cyber risk.

LAPD to use cloud-storage body cameras made by the Taser company

City News Service, LA Daily News,  Tuesday, November 04, 2014

Los Angeles Police Department officials said Tuesday they plan to move forward with using body cameras on its officers, choosing to go with Taser, which offers a cloud-based video storage system.

DISA in Compliance with Cloud Security Standards

Bob Brewin, Nextgov,  Tuesday, November 04, 2014

Mark S. Orndorff, the mission assurance executive for the Defense Information Systems Agency, said three commercial cloud services are currently available to DOD users: Autonomic Resources, CGI Federal and Amazon Web Services. Assessments of FedRAMP-compliant offerings from providers such as Hewlett-Packard, Lockheed Martin, AT&T, Akamai, Microsoft, Oracle and a cloud solution offered by the Agriculture Department are underway, he said.

Biggest ever cyber security exercise in Europe today

European Commission,  Thursday, October 30, 2014

More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA). In Cyber Europe 2014 experts from the public and private sectors including cyber security agencies, national Computer Emergency Response Teams, ministries, telecoms companies, energy companies, financial institutions and internet service providers are testing their procedures and capabilities against in a life-like, large-scale cyber-security scenario.

Microsoft unveils CJIS-capable cloud platform for law enforcement

Infotech,  Tuesday, October 28, 2014

Microsoft has announced a cloud platform that helps public safety departments meet Criminal Justice Information Services (CJIS) policies and connect to the FBI’s systems to securely access data. Law enforcement agencies adopting cloud platforms have concerns about meeting CJIS policies. Microsoft is addressing this concern by offering Microsoft Azure Government cloud, which helps these agencies address compliance obligations like CJIS. A number of Justice and Public Safety customers and partners of Microsoft are building new solutions on this platform, Microsoft said.

Operation SMN – Disruption of Axiom Group – Prolific Chinese Cyber Espionage Team

Brian Bartholomew, iSight Partners,  Tuesday, October 28, 2014

Earlier today iSIGHT Partners proudly participated in the public disclosure of threat intelligence on a prolific Chinese Cyber Espionage group. This disclosure included the sharing of technical indicators which can be used to determine the potential of compromise, as well as detail on the tactics, techniques and procedures of this group which can be used to inform better security decisions. This release was made as part of a coalition of security vendors, security researchers and major technology companies called “Operation SMN” which was announced on October 14th. The effort was led by Novetta and Microsoft and is the first joint effort under Microsoft’s Coordinated Malware Eradication program.

Final NIST cloud roadmap sets 'action plans' for gov't cloud adoption

Molly Bernhart Walker, FierceGovernmentIT,  Wednesday, October 22, 2014

The National Institute of Standards and technology Oct. 21 published a final version of its U.S. Government Cloud Computing Technology Roadmap. The document lays out 10 requirements – each accompanied by "priority action plans" and target completion dates – necessary for cloud adoption by the federal government. The 10 specific requirements relate to the broader priorities of security, interoperability, portability, performance and accessibility.

Russia and China to join forces as cyber superpowers

Russia Direct,  Tuesday, October 21, 2014

Russia and China could soon sign an agreement on cooperation in the field of cybersecurity, a move that some see as an attempt to reduce American influence in the information technology field.

Chinese government launches man-in-middle attack against iCloud

Sean Gallagher, Ars Technica,  Monday, October 20, 2014, a group that monitors censorship by the Chinese government’s national firewall system (often referred to as the “Great Firewall”), reports that China is using the system as part of a man-in-the-middle (MITM) attack on users of Apple’s iCloud service within the country. The attacks come as Apple begins the official rollout of the iPhone 6 and 6 Plus on the Chinese mainland. The attack, which uses a fake certificate and Domain Name Service address for the iCloud service, is affecting users nationwide in China. The team speculates that the attack is an effort to help the government circumvent the improved security features of the new phones by compromising their iCloud credentials and allowing the government to gain access to cloud-stored content such as phone backups.