Twitter Feed
The Time is Now for 21st Century Leadership
I’ve just had the opportunity to preview my good friend Melvin Greer’s newest effort, “21st Century Leadership: Harnessing Innovation, Accelerating Business Success“. Now in pre-release, this book highlights the compelling…
Public Cloud IaaS : A Price/Performance vs. Security Analysis
Industry’s transition from custom made, one-of-a-kind IT infrastructures to the standardize, commodity based cloud paradigm is well on it’s way. IBM’s recent “Under Cloud Cover” study highlights the rapidly of…
Catch the Cloud with DorobekINSIDER LIVE!
Yesterday I thoroughly enjoyed an opportunity to participate in the DorobekINSIDER LIVE edition on cloud computing. The conversation was both lively and informative. Joining me on the show were:…
Cloud Shines Brightly as Future of Disaster Response IT
The call for help began as a rumble. Twenty miles beneath the ocean’s surface, a rupture in a massive tectonic plate ripped a 310 mile-long break in the sea floor,…
NCOIC/NGA Demonstrates Use of Cloud in Disaster Response
When the world’s next major earthquake, tsunami or other disaster hits, military, government and civilian NGA project is available on the NCOIC website. responders will need to manage and…
NBC4 Puts On A Great GovCloud Show !!
NBC 4 in Washington, DC highlighted government cloud computing today as part of their GovInnovate show. Below is just a taste of the informative public service they provided. Go to…
OMB’s Evidence Memo: A Call for Cloud Services Brokerage
by Ray Holloman and Kevin Jackson In a late July memo the Office of Management and Budget requested cloud services brokerage. Well, not in so many words. Rather, OMB requested…
Cloud Services Brokerage Lessons From Alex Rodriguez, Baseball’s Trade Deadline
( A guest post from Ray Holloman, NJVC Corporate Communications) Two stories sat atop baseball’s marquee in the final days of July. The first was the non-waiver trade deadline, baseball’s…
Lessons Learned: VA Cloud Email Termination
According to a Federal Computer Week article by Frank Konkel, The Department of Veterans Affairs terminated its five-year, $36 million cloud computing contract for email and calendaring services with HP…
Deconstructing Cloud: An Excellent Guide to the Cloud Computing World
On an almost daily basis, I’m approach for my views on “cloud computing technology”. Although typically innocent in nature, I always cringe at the thought of enduring yet another hours…
UPDATE: NBC News reports U.S. officials have disclosed a hack of the Pentagon’s Joint Staff unclassified email system, which took place on July 25.
- A Federal Civilian agency increase in the use of strong authentication for privileged and unprivileged users from 42 percent to 72 percent
- An increase in the use of strong authentication for privileged users from 33 percent to nearly 75 percent
- The implementation of strong authentication across 95 percent of privileged users working in thirteen agencies, or more than half of the largest agencies – including the Departments of Transportation, Veterans Affairs, and the Interior Department
- Higher use of scripting languages
- More prevalent use of older languages which are known to produce more vulnerabilities
- Low rate of software remediation (e.g. fixing flaws)
- SQL injection was the application vulnerability most often exploited in web application attacks in a recent 2015 data breach Incident
- Cross-site scripting is overall far more prevalent than any other category
- OS command injection played a role in 2014’s Shellshock vulnerability, in which a commonly used open source component was exploited in a way that allowed taking over a server to run arbitrary code
- Grant DHS authority to operate intrusion detection and prevention software across the .gov domain
- Authorize DHS to conduct regular risk assessments on federal networks
- Require DHS to enact defensive countermeasures in the event an intrusion is detected
- Strengthen and streamline authority Congress gave to DHS last year to issue binding operational directives to federal agencies, especially to respond to substantial cybersecurity threats in emergency situations
- Mandate annual OMB reports on enforcement of government wide cybersecurity standards
( This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell’s thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes