Federal CIOs want better cloud vendor support

Kenneth Corbin, CIO,  Friday, May 15, 2015

Among federal CIOs, there is no shortage of interest in the cloud, but many agency IT leaders say they worry about security, what kind of support they'll get from their vendor, and the restrictions that come with long-term contracts, among other issues, government IT insiders say.

Security Discussions

Tracy Mitrano, Inside Higher Ed,  Thursday, May 14, 2015

We are all on the same page! After years of bridging the gap between “privacy” and “security” my sense in the aftermath of these two conferences is that higher education community is becoming increasingly aware and interested in closing the gap between these two areas of law, technology and business practice on our campuses. A more sophisticated approach, one that transcends each of those respective areas in favor of comprehensive information management programs that seek institutional governance, compliance and risk management.

Senators unveil student data privacy bill

Cory Bennett, The Hill,  Thursday, May 14, 2015

Sens. Orrin Hatch (R-Utah) and Ed Markey (D-Mass.) reintroduced a bill on Wednesday to restrict education companies from selling or using student data to target ads. The measure would also require private companies to meet certain data security requirements when handling student information.

States show the US federal government how to go big in cloud

Matt Asay, TechRepublic,  Thursday, May 14, 2015

If any vertical industry should have been immune from public cloud computing, it's government. Risk-averse and not particularly innovation or cost-driven, governments are most likely to play it safe with legacy vendors and legacy approaches to enterprise IT. But that's not what's happening. At least, not completely. While plenty of roadblocks remain to government cloud adoption, various states are showing the US federal government how to innovate and cut costs with the cloud.

Catching Criminals With the Cloud

Dan Kedmey, TIME Magazine,  Thursday, May 14, 2015

Crouch is the CEO of Mark43, a New York City–based startup that claims it has developed a better system for getting police records–currently a patchwork of isolated paper and digital files–into a single searchable body in the cloud. The software can display relevant information that’s as readable as the feeds on LinkedIn or Twitter. Crouch says this new way of visualizing suspects’ data–sketching out a web of phone calls or following a gang’s movements across a map, for example–could help investigators identify key players in a crime ring or exonerate the usual suspects much faster.

Are wearables violating HIPAA?

Julie Anderson by Julie Anderson, AG Strategy Group
Thursday, May 14, 2015

With the development of wearable technologies such as the Nike Fuel Band, Fitbit, and Apple Watch, consumers suddenly have more options to monitor their fitness performance than ever before. And the way these devices capture data poses serious privacy and security issues to individually-identifiable health information that must be addressed.

New report to congressional caucus paints broad picture of cloud computing progress, obstacles

Dibya Sarkar, FierceGovernmentIT,  Wednesday, May 13, 2015

While some federal departments like Defense, Homeland Security and Commerce are embracing cloud computing, most agencies lack resources, leadership and even a vision to move ahead, according to a May 11 report from an advisory group to the Congressional Cloud Computing Caucus. The report provides an overall picture of cloud computing efforts within the federal government, including investments made and barriers to further progress.

Squabbling Over Google’s ‘Right to Be Forgotten’ Continues One Year on

Sam Schechner, WSJ Digits,  Wednesday, May 13, 2015

The squabbling over Europe’s right to be forgotten may have scarcely begun. One year after the European Union’s top court ruled that people could ask Google and other search engines to remove links in search results for their name, the Calif.-based search giant has set up a detailed process to comply, removing hundreds of thousands of links. But a bigger fight is continuing to simmer over how broadly the new European right should apply—one that could end up back in court.

A strong vote to reform our surveillance laws

Susan Molinari, Google Public Policy Blog,  Wednesday, May 13, 2015

We’re grateful that the U.S. House of Representatives just approved the USA Freedom Act, which -- as I blogged last week -- takes a big step toward reforming our surveillance laws while preserving important national security authorities. It ends bulk collection of communications metadata under various legal authorities, allows companies like Google to disclose national security demands with greater granularity, and creates new accountability and oversight mechanisms.

Google Moves Its Corporate Applications to the Internet

Rachel King, Wall Street Journal,  Tuesday, May 12, 2015

Google Inc., taking a new approach to enterprise security, is moving its corporate applications to the Internet. In doing so, the Internet giant is flipping common corporate security practice on its head, shifting away from the idea of a trusted internal corporate network secured by perimeter devices such as firewalls, in favor of a model where corporate data can be accessed from anywhere with the right device and user credentials. The new model — called the BeyondCorp initiative — assumes that the internal network is as dangerous as the Internet. Access depends on the employee’s device and user credentials. Using authentication, authorization and encryption, the model grants employees fine-grained access to different enterprise resources, wrote Google’s Rory Ward and Betsy Beyer in a paper published in December