Welcome!

Government Cloud Authors: Shelly Palmer, Automic Blog, Liz McMillan, AppDynamics Blog, Pat Romanski

Blog Feed Post

Odierno: budget is greatest threat to national security, Data.gov gets new Alpha site and more

By

DoDHere are the top cyber news and stories of the day.

  • DOD, VA improve eBenefits portal – The eBenefits self-service portal has been updated. This portal allows service members and vets unparalleled access to information and services. It allows users to get into compensation services, even populated the information from their VA records. Via FedScoop, more here.
  • Government Appetite Growing for Twitter User Data – “Twitter said Monday that just 19 percent of federal and state government requests for user data were accompanied by probable-cause search warrants during the six months ending in December 2012.” There were 815 total requests for Twitter user data. Twitter also demands a probable-cause warrant. Via Wired, more here.
  • 86,800 network printers open to the whole internet – is one of them yours? – “UK blogger @skattyadz, alias Adam Howard [*], did a Google search for a URL matching the pattern you might use to connect to a nearby printer on your office network.” He built his search terms to look specifically for HP printers, so there are likely to be thousands of other open network printers. Via Naked Security, more here.
  • Odierno: budget is greatest threat to national security - Army Chief of Staff, Ray Odierno, believes that “Fiscal uncertainty and potential budget shortfalls are the greatest threat to national security.” Apparently, the Joint Chief of Staffs wrote a letter to the House and Senate concerned about how future budgets could affect national security. ““In the past we’ve taken reductions during relative peace and stability, but in my mind as I look at the world today, there’s instability on every continent around the world and there’s incredible uncertainty on what the future may hold,”” said Odierno. Via FedScoop, more here.
  • DDoS attacks, mobile traffic visibility top security concerns: Arbor – According to Arbor Networks’ most recent report, over 90% of data centers are experiencing DDoS attacks. They also found 60% of mobile providers have no oversight over their 4G LTE networks. Via ComputerWorld Australia, more here.
  • The dangers of third-party code for cloud security – “Imperva announced a new report which examines the dangers of third-party code in cloud computing.In December 2012, a hacker breached Yahoo! with an SQL injection attack that took advantage of a vulnerability in a third-party application that was provided on the Yahoo! Web site.” This has emphasized the dangers that using 3rd party code in cloud services can open a service up to. Via Net Security.org, more here.
  • Google Announces Pwnium 3, Ups Ante and Offers $3M+ in Rewards – In this year’s competition, Google is opening up the Chrome OS to the competitors. Google is offering $3.14159M (you nerds should get it) in reward money. According to the Chromium blog, “the company will offer $110,000 for a “browser or system level compromise in guest mode or as a logged-in user, delivered via a web page” and $150,000 for a “compromise with device persistence — guest to guest with interim reboot, delivered via a web page.”" Via Threat Post, more here.
  • New bug makes moot Java’s latest anti-exploit defenses, claims researcher – “Java’s new security settings, designed to block “drive-by” browser attacks, can be bypassed by hackers, a researcher announced Sunday.” Adam Gowdiak, CEO of Security Explorations, found that the new settings for Java do not shut down attackers at all. Via ComputerWorld, more here.\
  • Pentagon to boost cybersecurity force – The Pentagon will be plussing up their cybersecurity force by almost five-fold, in the next few years. The USCYBERCOM unit will grow from 900 personnel to over 4,900 total servicemembers and civilians. “The plan calls for the creation of three types of forces under the Cyber Command: “national mission forces” to protect computer systems that undergird electrical grids, power plants and other infrastructure deemed critical to national and economic security; “combat mission forces” to help commanders abroad plan and execute attacks or other offensive operations; and “cyber protection forces” to fortify the Defense Department’s networks.” Via Stars and Stripes, more here.
  • Data.gov gets agile with new alpha site - ”Data.gov is on track to getting a .gov makeover right before our very eyes thanks in part to an agile, open approach to development being adopted by the General Services Administration.” They are attempting to “create an online showcase” designed to highlight what data.gov can do. Via FedScoop, more here.
  • When reforming FISMA, don’t throw out what works – William Jackson of GCN, explores the value that FISMA has already had in government. While FISMA has required enormous amounts of paperwork, and “focused on compliance rather than risk”. “Before Congress fiddles too much with the act, lawmakers should have a good idea of how that implementation has improved and what the impact has been, and what practices have actually improved security in agencies.” Via GCN, more here.
  • Motorola Solutions unveils MC45 mobile computer – Motorola has released details on a new rugged mobile tablet. The problem with these capabilities is that they do not outstrip devices such as the Apple iPad or Google Nexus 7 or any smartphone in any terms of value. The device starts at $1,345 and has an enhanced model that is $2,295. These have small screens and small keyboards, but Motorola must believe their “ruggedization” to be worth the cost. We shall see, but I hope that most organizations start thinking more agilely and purchase commercial devices with rugged cases as opposed to COTS devices with built in protections. Via IDG/ComputerWorld, more here.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

@ThingsExpo Stories
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...