Kenneth Corbin, CIO, Friday, May 15, 2015
Among federal CIOs, there is no shortage of interest in the cloud, but many agency IT leaders say they worry about security, what kind of support they'll get from their vendor, and the restrictions that come with long-term contracts, among other issues, government IT insiders say.
Tracy Mitrano, Inside Higher Ed, Thursday, May 14, 2015
We are all on the same page! After years of bridging the gap between “privacy” and “security” my sense in the aftermath of these two conferences is that higher education community is becoming increasingly aware and interested in closing the gap between these two areas of law, technology and business practice on our campuses. A more sophisticated approach, one that transcends each of those respective areas in favor of comprehensive information management programs that seek institutional governance, compliance and risk management.
Cory Bennett, The Hill, Thursday, May 14, 2015
Sens. Orrin Hatch (R-Utah) and Ed Markey (D-Mass.) reintroduced a bill on Wednesday to restrict education companies from selling or using student data to target ads. The measure would also require private companies to meet certain data security requirements when handling student information.
Matt Asay, TechRepublic, Thursday, May 14, 2015
If any vertical industry should have been immune from public cloud computing, it's government. Risk-averse and not particularly innovation or cost-driven, governments are most likely to play it safe with legacy vendors and legacy approaches to enterprise IT. But that's not what's happening. At least, not completely. While plenty of roadblocks remain to government cloud adoption, various states are showing the US federal government how to innovate and cut costs with the cloud.
Dan Kedmey, TIME Magazine, Thursday, May 14, 2015
Crouch is the CEO of Mark43, a New York City–based startup that claims it has developed a better system for getting police records–currently a patchwork of isolated paper and digital files–into a single searchable body in the cloud. The software can display relevant information that’s as readable as the feeds on LinkedIn or Twitter. Crouch says this new way of visualizing suspects’ data–sketching out a web of phone calls or following a gang’s movements across a map, for example–could help investigators identify key players in a crime ring or exonerate the usual suspects much faster.
AG Strategy Group
Thursday, May 14, 2015
With the development of wearable technologies such as the Nike Fuel Band, Fitbit, and Apple Watch, consumers suddenly have more options to monitor their fitness performance than ever before. And the way these devices capture data poses serious privacy and security issues to individually-identifiable health information that must be addressed.
Dibya Sarkar, FierceGovernmentIT, Wednesday, May 13, 2015
While some federal departments like Defense, Homeland Security and Commerce are embracing cloud computing, most agencies lack resources, leadership and even a vision to move ahead, according to a May 11 report from an advisory group to the Congressional Cloud Computing Caucus. The report provides an overall picture of cloud computing efforts within the federal government, including investments made and barriers to further progress.
Sam Schechner, WSJ Digits, Wednesday, May 13, 2015
The squabbling over Europe’s right to be forgotten may have scarcely begun. One year after the European Union’s top court ruled that people could ask Google and other search engines to remove links in search results for their name, the Calif.-based search giant has set up a detailed process to comply, removing hundreds of thousands of links. But a bigger fight is continuing to simmer over how broadly the new European right should apply—one that could end up back in court.
Susan Molinari, Google Public Policy Blog, Wednesday, May 13, 2015
We’re grateful that the U.S. House of Representatives just approved the USA Freedom Act, which -- as I blogged last week -- takes a big step toward reforming our surveillance laws while preserving important national security authorities. It ends bulk collection of communications metadata under various legal authorities, allows companies like Google to disclose national security demands with greater granularity, and creates new accountability and oversight mechanisms.
Rachel King, Wall Street Journal, Tuesday, May 12, 2015
Google Inc., taking a new approach to enterprise security, is moving its corporate applications to the Internet. In doing so, the Internet giant is flipping common corporate security practice on its head, shifting away from the idea of a trusted internal corporate network secured by perimeter devices such as firewalls, in favor of a model where corporate data can be accessed from anywhere with the right device and user credentials. The new model — called the BeyondCorp initiative — assumes that the internal network is as dangerous as the Internet. Access depends on the employee’s device and user credentials. Using authentication, authorization and encryption, the model grants employees fine-grained access to different enterprise resources, wrote Google’s Rory Ward and Betsy Beyer in a paper published in December