Welcome!


Security

Federal records management is an increasingly complex undertaking in the era of big data. Three principles are needed for success in records management: capture on creation; manage and secure through the workflow; and archive responsibly.
My name is Larry Warnock, and I'm the CEO of Gazzang, a data security software company based in Austin, Texas. Our headquarters are actually right across the street from the Capital Factory which you visited this past May. I recognize that the healthcare.gov launch hasn't exactly met ...
The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA’s...
New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the “Snowden leak”, showing the NSA violated its own ...
Most people would agree that finding terrorists and stopping them before they can wreak havoc is a good thing. It is also safe to assume that most people would allow that the US Government should be in the intelligence-gathering business, if only to stop the aforesaid terrorists. Count...
With the endorsement by the Federal Financial Institutions Examination Council (FFIEC), smaller financial institutions which a beholden to many compliance audits and security issues can now explore the possibility of outsourcing security features from the cloud. Now these organizations...

There is a lot of guidance and expertise on achieving PCI compliance. In virtualized and cloud computing environments it is trickier, yet a lot of expertise is building up there as well. Witness the venerable PCI Security Standards organization and its guideline for virtualization, ...

Ever since cloud computing burst onto the technology scene a few short years ago, Security has always been a top concern.  It was cited as the biggest hurdle in many surveys over the years and in 2010, I covered a lot of those in my CloudFucius blog series.   A recent In...
TORONTO – June 12, 2012 – PerspecSys Inc., the leader in cloud data protection solutions for the enterprise, today announced it has become a Corporate Member of the Cloud Security Alliance (CSA). The CSA is a not-for-profit organization with a mission to promote the us...
United States military contractors are under unprecedented pressure to find ways to cut costs for their federal government customers despite the interest in developing new technologies to fight the war on terrorism. Gone are the days when contracts would swell exponentially without any...
An alphabetical selection of some of the many themes & topics to be discussed at Cloud Expo Silicon Valley (9th Cloud Expo) - being held November 7-10, 2011, at the Santa Clara Convention Center, CA. The markets may still be melting, but Cloud Expo is definitely coming of age!
Howard Schmidt, the cyber security czar for the Obama administration, stated it clearly when he said, "the government needs to focus its cyber security efforts to fight online crime and espionage." As cyber security coordinator at the White House Schmidt published the Comprehensive Na...
There's been a flurry of discussion this week among Internet and Web standards heavy-hitters around WebSocket, the new communications protocol supported in Chrome 4 and Safari 5. What was the main issue? Is there some kind of fundamental security vulnerability with the WS protocol? Web...
In an environment where the IT organizations, on the one hand, face resource constraints and on the other hand, have to meet growing business needs, they have to look newer and cost effective methods of computing and cloud computing aims to achieve these aims by balancing the conflicts...
We are constantly bombarded with articles and presentations about the security risks in cloud computing and why organizations need to be concerned about them as they consider a move. The truth is that organizations do need to be concerned about security – but they needn’t be paralyzed ...
"I am grateful to the passengers and crew aboard Northwest Flight 253 who reacted quickly and heroically to an incident that could have had tragic results. The Department of Homeland Security immediately put additional screening measures into place -- for all domestic and international...
Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Se...

A recent tweet about a free, Linux-based XML Security suite reminded me that we do not opine on the subject of XML security and its importance enough. Dec. 12, 2009 10:30 AM EST  Reads: 6,177

With its ability to provide users dynamically scalable, shared resources over the Internet and avoid large upfront fixed costs, cloud computing promises to change the future of computing. However, storing a lot of data creates a situation similar to storing a lot of money, attracting m...
According to the Trend Micro 2010 Future Threat Report, cloud computing and virtualization -- while offering significant benefits and cost-savings -- move servers outside the traditional security perimeter and expand the playing field for cybercriminals. The industry already witnessed ...
A JetBlue Embraer ERJ-190, registration N279JB performing flight B6-904 from Chicago O'Hare, IL to New York JFK, NY (USA) with 64 passengers and 4 crew, was on final visual approach to JFK's runway 31R descending through 2000 feet, when the crew reported they needed to abort the approa...
Why is cloud computing relevant today from an economic, business and technology standpoint? What are some potential benefits – and pitfalls – of moving to the cloud? What should you look for in a cloud computing provider to ensure the security of your data and applications? And above a...
SYS-CON Events announces that Jill Tummler Singer, Deputy Chief Information Officer at the Central Intelligence Agency (CIA), will be delivering the opening keynote at the 1st Annual Government Conference & Expo (www.GovITExpo.com) on October 6th in Washington DC. Ms Singer was appoint...
A round-up of the problems, issues and opportunities due to be discussed October 6, 2009 in Washington, DC, at SYS-CON's 1st Annual Government IT Conference & Expo (www.GovITExpo.com), a 1-day deep dive into the new wave of Internet-based technologies that are changing the way that Fed...
With a breakout session that will have special emphasis on separating historical trends from the current state of cloud security, the CEO of WhiteHat Security, world-renowned Web security expert Jeremiah Grossman, is one of the many leading CEOs, CTOs and Senior VPs who will be speakin...
For its next trick, the unquenchable, super-ambitious Google is gonna try taking over the US government. On Tuesday, after the first federal CIO Vivek Kundra unveiled Apps.gov, a thinly populated, GSA-managed, almost completely salesforce.com- and Google-dominated web store where fe...
SYS-CON Events announced today that Philip Lieberman, Founder and President of Lieberman Software, will be presenting at the upcoming Government IT Conference & Expo (www.GovITExpo.com) this coming October 6th in Washington, DC. His session will be entitled “Protect Your Government Age...

This week in San Diego, CA the US Navy held the initial planning conference for Trident Warrior ...
Does this situation sound familiar? A company that you are very familiar with has just been the victim of a significant security incident. The clean-up has been complex and costly, as you’ve heard from multiple connections at other companies. And the president of your company has heard...