Welcome!


Latest Blogs from Government Cloud
Here is today’s federal cybersecurity and information technology news: The Department of Homeland Security has launched a new initiative to develop and recruit the national cybersecurity workforce. More here. A Washington Post poll finds that Americans are divided about what role...
This post is co-written by AdamElkus and Alex Olesker. Before we begin, please understand just how hard it is for us to write this blog. I’ve read Neuromancer countless times, enthusiastically used Snow Crash in undergrad to talk about the future of international relations, and w...
On June 6th, the Federal Risk and Authorization Management Program, the government’s cloud security assessment plan known as FedRAMP will begin accepting security certification applications from companies that provide software services and data storage through the cloud. On Monday, GS...
We have just published the first version of our solution guide for Government Cloud Computing (GovCloud) : GovCloud.info Government Cloud Computing (GovCloud) is our comprehensive engagement for public sector organizations looking to embrace Cloud Computing. OASIS International Cloud S...
Forceworks Are you ready for the transition from Hardware-Centric to Software-Centric?Do you ever talk to an “Old” IT person? You know, like 40ish. Man, do they have some stories about how IT used to be back in the day. Things sure have changed a lot. You […]
The Bunker, provider of Ultra Secure Managed Hosting, Cloud Computing, Colocation, and Outsourced IT services from within Europe's most secure data centres, is pleased to announce the appointment of Philip Bindley to the role of Chief Technology Officer (CTO). He will be responsible fo...
Late today the FedRAMP Program Management Office released the first list of certified Third Party Assessment Organizations (3PAOs). These companies are accredited to perform initial and periodic assessment of cloud service provider (CSP) systems per FedRAMP requirements, provide eviden...
On 11 June 2012 the Cyber Physical Systems Virtual Organization will be holding a symposium on Moving Target Research. In this context, think of Moving Target as meaning the creation of a dynamic attack surface to adversaries done in a way that dramatically increases the work factor re...
This week Ustream gets an injection of political reality, Apple fixes a critical encryption blunder affecting some of its users, FBI documents are leaked detailing their worries over Bitcoin digital currency, and Anonymous takes down more Governmental websites as part of its ongoing op...
Government agencies are reportedly one of the primary benefactors of managed cloud services. According to the results from a recent market study by IDC, IT decision-makers across the Asia-Pacific region (excluding Japan) found that 59 percent of public sector respondents are confident ...
The headline theme of our upcoming events, both the GovCloud 2.0 webinar and the Drummond Reportworkshop and white paper, is the role of Cloud Service Brokers and how they will enable the transition to ITaaS – IT as a Service. The second part of our webinar will focus on the emer...
Here are today’s federal cybersecurity and information technology news: The Missile Defense Agency has issued a request for proposals for a new methods to identify counterfeit electronics. More here. The Federal Bureau warns travelers not to update software on hotel wireless netw...
We’ve just published our first main ‘Solution Guide’, a complete snapshot of how Cloud is applied in one specific area, in this case the Microsoft portfolio. MicrosoftCloud.biz is intended as a channel marketing tool to envelop all aspects of the Microsoft Cloud suppl...
As more and more large enterprises start to make public adoptions of cloud and service providers figuring out the role they play in the market, one of the biggest potential cloud adopters has been watching and looking for signs that the market can support one of the most public facing ...
Should MySpace last the next 20 years, it’ll have at least one close observer: the federal government.  MySpace’s privacy practices will be kept under close watch by a third-party observer for two decades as part of a settlement related to an investigation of the company’s advertising ...
A recent study revealed that the government is saving around $5.5 billion a year since the shift to cloud, according to this CRN article. The study was created from interviews with 108 federal IT managers and CIOs and was published by MeriTalk Cloud Computing Exchange. The study also f...
Today’s federal cybersecurity and information technology news: The White House has threatened to veto the Cyber Intelligence Sharing and Protection Act (CISPA) if it reaches the President in its current form. More here. The Office of Management and Budget agrees, asking President...
Editor’s note: This post by Sean Lawson provides context on cyber conflict, an area of interest at the nexus of national security and technology. – bg Recently, Dr. Thomas Rid of the War Studies department of King’s College in London published an article in the Journa...
Today’s federal cybersecurity and IT news: Maj. Gen. Suzanne Vautrinot, commander the 24th Air Force and Air Force’s Cyber Air Component to USCYBERCOM emphasized the importance of “full-spectrum” cybersecurity that prepares for offense, defense and exploitation....
Anonymous claimed credit for taking down the Department of Justice and Central Intelligence Agency websites, as well at the website of MI6 in the UK. More here. The Defense Advanced Research Projects Agency has issued a request for proposals for more power-efficient processes in embedd...
These days, the number of Cloud applications on the market is rapidly expanding as businesses warm up to the Cloud delivery model. While the proliferation of Cloud options on the market is great for spurring competition and innovation in the Cloud, it has resulted in a diverse array of...
NJVC®, one of the largest information technology solutions providers supporting the U.S. Department of Defense, and Gravitant®, a provider of cloud brokerage and management solutions for IT enterprises, announce a new strategic alliance. Under the terms of the partnership, the two comp...
One of the most fun aspects of hosting The Cloudcast (.net) podcast is that we take a completely vendor-neutral and technology-neutral stance on what we discuss and who we invite onto the show. Lots of learning and lots of great discussions. And occasionally we ask a few questions and ...
Last year on our Open Government webinar Andy MacLeod of Cisco presented on G-Cloud, the UK program to adopt Government Cloud Computing, providing an initial basis for our G-Cloud section in GovCloud.info. (Join our GovCloud Linkedin networking group here).
The main objective of our projects like the Drummond Report and Cloud analysis, is to focus on the relationship between the technology and the desired outcomes in terms of business transformation. The Drummond Report is another political exercise focused on the growing public sector d...
According to the story published by The Guardian, Twitter closed down a string of accounts purporting to be authored by the Syrian president and the first lady, emails revealed. A senior aide to Asma al-Assad, Fares Kallas, took issue with the site over 11 accounts. Half of the accoun...
While most commentary about managed cloud services tend to focus on the advances in commercial enterprise applications, government agencies are also making noteworthy progress. In particular, the advent of regional community cloud hubs is a phenomenon that's worthy of further explorati...
Newton, MA, March 19, 2012 --(PR.com)-- info360 (June 12-14, 2012; Jacob Javits Convention Center), North America’s largest and most comprehensive enterprise content event, will provide information technology (IT) professionals with the tools they need to securely join data stre...
academia and government on the mission needs and benefits of new approaches to Information Technology implementation in support of national security missions. The report, titled “Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community” was highlighted ...
NJVC, one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense, announces that a white paper addressing the risks and benefits of cloud computing for the intelligence community (IC)—co-authored by Kevin L. Jackson, NJVC vice president...
NASA was hacked 13 times last year, resulting in major breaches of sensitive government data. Hackers working from Chinese IP addresses gained full access to NASA’s files, employee credentials and system logs. Unencrypted laptops were also stolen containing codes for controlling the In...
Linode Hacked, Bitcoins Stolen: Linode.com, popular provider of virtual private servers (VPS) systems responded to a morning breach of it’s control panel software, which apparently enabled a malicious attacker to gain control over several virtual servers of a bitcoin service named Bitc...
The 1980s Marine Corps doctrine of Maneuver Warfare (MW) heavily focused on the concept of “surfaces and gaps.” Marines, which largely defined themselves with frontal tactical and operational attacks against fortified sites in World War II maritime campaigns, would aim to m...
Next month I’ll be speaking at the OMG Public Sector Cloud Council Summit, on a topic of ‘Hybrid SaaS – Platform for Software as a Service in the Public Sector’. This will enable some government agencies to provide applications on a SaaS basis to other agencies,...
Our next best practices white paper and workshop is going to be ‘Cloud Computing and the Drummond Report‘. This is a dramatic report recently published to chronicle the fiscal position of the Province of Ontario, with a comprehensive list of recommendations for what reforms...
Federal, state, and local government agencies gathered in Washington D.C. on 16 February to participate in Cloud/Gov 2012 held at the Westin Washington D.C.
The National Science Foundation released their report on cloud computing. It can be found here. The intent of this report is to provide information that guides funding programs. The NSF used NIST’s guidance on cloud computing to inform their research and decision making. This report wi...
[Editor's note: this analysis predates any official announcements by NASA] Recently, some news of a NASA hack-and-dump passed my twitter deck. I decided after watching a few of my friends re-tweet the news that it might be worth checking out. At least I’d see if I could perform some...
"Cyber Threat Analysis" is the practice of effectively fusing knowledge of an organizations network vulnerabilities, both internal and external (including essential IT systems), and matching these against actual cyberattacks and threats seen out in the wild. The output of this fused a...
I’m at a State Department conference at Georgetown U about real-time data. I’m unfortunately going to have to miss a chunk of the afternoon due to another obligation.) NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness...