Welcome!

Government Cloud Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Dana Gardner, Liz McMillan

Blog Feed Post

How DHS Views Security, EHR adoption fueling health information exchange

By

DHSHere are the top cyber news and stories of the day.

  • Study: EHR adoption fueling health information exchange – “Health information exchange between hospitals and other providers increased 41 percent between 2008 and 2012, according to recently published research from the Office of the National Coordinator for Health Information Technology.” This jump in sharing can be hugely beneficial to doctors and healthcare professionals. The federal government is even implementing an incentive programs for facilities to use EHR. Via FierceGovernmentIT, more here.
  • Army finishes migration to DoD enterprise email – “The Army announced that it has completed its large-scale migration of more than 1.4 million unclassified users and 115,000 classified users to the Defense Information Systems Agency-managed enterprise email, one of the service’s highest priority IT programs.” The Army expects this program to save them millions of dollars, and up to $380M through 2017. Via FierceGovernmentIT, more here.
  • Report shows growth in Android-based malware – “Android-based malware achieved a 35 percent growth rate, according to the McAfee Threats Report: Second Quarter 2013.” This growth is higher than last years. Clearly Android users are the target of choice for malware distributors, so users need to be even more careful. However, most of the damage is done by users trying to get illegal (or free) software, and is self inflicted. Via ComputerWorld, more here.
  • Google applies for location-based security patent for mobile devices – The latest patent application by Google shows promise for differing security settings based on your location. It could switch from slide to unlock at home to PIN unlock when away. This could also provide a great deal of security for BYOD users, locking down the work environment when the device is not in the office. Via Android Community, more here.
  • Networking, security issues still irk large AWS shops – “Networking and security cloud challenges topped the list for most of the five panelists at an Amazon Web Services (AWS) meet up group this week, all of whom have at least 1,000 instances running on AWS.” AWS is having security group issues, which manifest when users change settings or implement new rules. This can lead to a large security hole in the AWS instance. There are also issues with ensuring compatible or identical security group rules among different data centers. AWS security issues will be increasingly important as more and more federal agencies adopt AWS. Via Search Cloud Computing, more here.
  • U.S. Department of Homeland Security Awards HP Continuous Monitoring Services Contract – “HP today announced it has been selected as a technology provider by the U.S. Department of Homeland Security (DHS) for the Continuous Diagnostics and Mitigation (CDM), Tools and Continuous Monitoring as a Service (CMaaS) General Services Administration (GSA) Blanket Purchase Agreement (BPA). The one-year contract has a ceiling of $6 billion if all four one-year options are exercised. HP is one of 17 vendors chosen to make up the BPA.” Via Dark Reading, more here.
  • How DHS views security – ‘The Department of Homeland Security has been an early adopter for years: cloud, mobility, agile acquisition. And as Margie Graves, the agency’s acting CIO, said, “We’ve got the scars to prove it.” Thursday, Graves shared some of those scars from integrating and securing new technologies at FedScoop’s fifth annual Lowering the Cost of Government with IT conference.” Via FedScoop, more here.
  • Cloud security: understanding your data value pyramid – “The benefits of cloud computing are well known – cost saving, flexibility, instant scalability and an “anytime, anywhere” mentality all wrapped up in an appealing pay-as-you-go business model. But, does this new-world packaging simply become too hard to resist, putting organisations at risk of becoming addicted to the cloud at the expense of security?” This article offers good insight into some of the data issues faced by today’s IT decision makers. As well, it can help guide those looking to move to the cloud in the most appropriate cloud strategy. Via The Guardian, more here.
  • Popular download management program has hidden DDoS component, researchers say – “Recent versions of Orbit Downloader, a popular Windows program for downloading embedded media content and other types of files from websites, turns computers into bots and uses them to launch distributed denial-of-service (DDoS) attacks, according to security researchers.” This software has been downloaded 36M times in total, and over 12,000 times last week alone. This is horrifying, and makes me reconsider pretty much every program I’ve ever downloaded. Be careful folks! Via ComputerWorld, more here.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...