Cloud & Data Center

Why Modernization Is Key to National Cyber Strategy

The president’s executive order on cybersecurity emphasizes systems modernization and cloud as a first step toward emphasizing protection of data rather than the network itself.

Read More

What’s New

Proactive Resilience: The Future of Cybersecurity

Today’s state of the art in cybersecurity is operational resilience – the ability to keep operating in the midst of a disruptive attack. Tomorrow’s state of the art is what Carnegie Mellon CERT’s Summer Fowler calls “prosillience” – the ability to anticipate and adapt before disruptions strike. Here’s how we’ll get from now to then.

Can Micro Certifications Match Government’s Real-World Needs?

Certifications have become the standard to prove one’s knowledge of a set of skills. According to the 2017 Global Information Security Workforce Study, 73 percent of federal agencies require their IT staff members to hold information security certifications. To stay abreast of rapid technological change, micro certifications, which provide shorter, more focused specialized training on a specific skill set needed for a given job, might be as just effective but less costly and time-consuming.

What We’re Reading

One of Air Force’s Most Important Unclassified Systems is Now in the Oracle Cloud

One of the U.S. Air Force’s most important online portals is now running in the cloud.

MyPers, the Air Force’s personnel portal for 1.7 million active duty and retired airmen, civilian and reservists, began operating in July out of an Oracle-managed off-premise cloud specifically designed and secured to handle some of the Defense Department’s most sensitive unclassified workloads.

Electronic Threats from Above

Adversarial capabilities writ large have significantly improved vis-à-vis the United States (hence the necessity of the Defense Department’s so-called third offset strategy). One of these areas causing concern is that of the electromagnetic spectrum (EMS).

Dead Men May Tell No Tales, But IoT Devices Do

Privacy invasions related to the internet of things (IoT) are already becoming reality. In Arkansas, local law enforcement is trying to access the records of an Amazon Echo device as evidence in a murder investigation and has already compiled evidence based on the files of an IoT water heater.

Securing IoT Devices From Within

Security experts have long fretted about the rapidly expanding number of internet of things devices. While most such tools may not contain data that should be protected, many connect to the cloud and represent easy targets for hackers to gain access — not only to that device, but to all other devices connected to an IoT mesh.

Cloud.gov Clears FedRAMP

The General Services Administration-run cloud.gov hosting platform has completed the final stage of Federal Risk and Authorization Management Program assessment.