Maneuver Warfare in IT: A Cheerleading Pundit

“Cash for Clunkers” Should Have Used the Cloud!

By G C Network | August 24, 2009

Rich Bruklis wrote an excellent essy on how the government missed a perfect opportunity to use cloud computing. In “Cloud Opportunity Missed” he writes: “It appears that the voucher system…

US Navy Experiments With Secure Cloud Computing

By G C Network | August 20, 2009

This week in San Diego, CA the US Navy held the initial planning conference for Trident Warrior ’10. The Trident Warrior series is the premier annual FORCEnet Sea Trial Event…

GSA To Present On Cloud Initiative at NCOIC Plenary

By G C Network | August 13, 2009

A General Services Administration (GSA) representative is now scheduled to provide a briefing on the agency’s cloud computing initiative during a “Best Practices for Cloud Initiatives using Storefronts” session on…

FAA CIO Focuses on Cybersecurity

By G C Network | August 12, 2009

During this week Federal Executive Forum, FAA CIO Dave Bowen mentioned protection against software vulnerabilities, wireless intrusion and website vulnerabilities as his top cybersecurity priorities. As the Assistant Administrator for…

DHS Asst. Secretary Addresses Cybersecurity Priorities

By G C Network | August 11, 2009

Greg Schaffer, Assistant Secretary for CyberSecurity & Communications for the US Department of Homeland Security, sees Trusted Internet Connections, EINSTEIN, and front line defense of the nation’s networks as top…

US DoD Chief Security Officer on Cybersecurity Priorities

By G C Network | August 10, 2009

In a Federal Executive Forum interview, Robert Lentz, Chief Security Officer for the US Department of Defense, highlighted the departments cybersecurity priorities. Mr. Lentz is the Deputy Assistant Secretary of…

Twitter Under Denial of Service Attack

By G C Network | August 6, 2009

Multiple sources are reporting that Twitter continues to be under a denial of service attack. Some are speculating that this represents the power of a coordinated bot network attack. For…

NCOIC Holding Full Day Cloud Computing Session

By G C Network | August 5, 2009

The Network Centric Operations Industry Consortium (NCOIC) will be holding a one-day cloud computing session during its plenary meetings, 21-25 September at the Fair Lakes Hyatt in Fairfax, VA. A…

Sevatec a New Player in the Federal Cloud Computing Market

By G C Network | August 3, 2009

Just in time for the new Federal Cloud Computing Storefront, Sevatec, Inc. is announcing the development of a toolkit to help federal agencies transform their enterprise architectures to cloud computing…

GSA Releases Cloud Computing RFQ

By G C Network | July 31, 2009

Following through on a much anticipated action, GSA released their Cloud Computing Request For Quotation (RFQ) today. Cloud computing is a major part of President Obama’s reform effort and this…

The Twitter conversation between Christofer Hoff and I went like this:
Christofer – I haven’t formally blogged a resp. (yet) to @Kevin_Jackson on his ‘maneuver warfare in IT’ Not just a cultural shift but a huge tech. one
Kevin – @Beaker I’m looking forward to your comments.
Christofer –  @Kevin_Jackson I want them to be constructive, so I’ll do my best. I’m having trouble with the reality distortion field vs. unicorns 😉
Kevin – @Beaker LOL
I strongly recommend that you read his response titled “Cloud Computing Security: (Orchestral) Maneuvers In the Dark?”. It begins:
“I enjoyed Kevin’s piece but struggled with how I might respond: cheerleader or pundit.  I tried for a bit of both.”
The challenges he had with my article, include:
  • Mixing tenses in some key spots seemed to imply that out of the box today, Cloud Computing can deliver on the promises Kevin is describing now.  Given the audience, this can lead to unachievable expectations
  • The disconnect between the public, private and military sectors with an over-reliance on military analogies as a model representing an ideal state of security operations and strategy can be startling
  • Unrealistic portrayals of where we are with the maturity of Cloud/virtualization mobility, portability, interoperability and security capabilities
His last couple of paragraphs, however, really brings it home:
“It’s absolutely a cultural issue, but we must strive to be realistic about where we are with Cloud and security technology and capabilities as aligned.  As someone who’s spent the last 15 years in IT/Security, I can say that this is NOT the “…dawning of a new day in IT security,” rather it’s still dark out and will be for quite some time.  There is indeed opportunity to utilize Cloud and virtualization to react better, faster and more efficiently, but let’s not pretend we’re treating the problem when what we’re doing is making the symptoms less noticeable.
I am absolutely bullish on Cloud, but not Cloud Security as it stands, at least not until we make headway toward fundamentally fixing the foundational problems we have that allow the problems to occur in the first place.”
Please read his post and comment.  This is a GOOD conversation !!

Follow me at https://Twitter.com/Kevin_Jackson

G C Network