Twitter Feed
The Endpoint Imperative: Global Security Compliance. Are you ready?
China has its Cybersecurity Law. Next May, the General Data Protection Regulation – or GDPR –goes into effect for the European Union. Research shows most organizations just aren’t…
The Endpoint Imperative: IT Spending: Setting Priorities in a Volatile World
Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user…
Top 1000 Tech Bloggers
The Rise “Top 1000 Tech Bloggers” leaderboard recognizes the most inspiring Tech journalists and bloggers active on social media. They use Klout scores (50%) and the blogger’s twitter conversations on…
IBM – The Power of Cloud Brokerage
Hybrid cloud adoption is now mainstream and you are making decisions every day about how to transform application and infrastructure architectures, service delivery, DevOps, production operations and governance. With Cloud…
More SMB Love Needed
In a recent post, titled “10 Surprising Facts About Cloud Computing and What It Really Is”, Zac Johnson highlighted some interesting facts about cloud computing in the SMB…
ATMs Are IT Too!
That world of homogenous IT technology managed entirely by the internal IT organization has long disappeared. Operations today require efficient and global management of technologically heterogeneous environments. The challenges and…
Digital Transformation Asset Management
Today’s businesses run in the virtual world. From virtual machines to chatbots to Bitcoin, physical has become last century’s modus operandi. Dealing with this type of change in business even…
The Game of Clouds 2017
The AWS Marketplace is growing at breakneck speed, with 40% more listings than last year! This and more insights were revealed when CloudEndure used their custom tool to quickly scan the…
Managing Your Hybrid Cloud
Photo credit: Shutterstock Runaway cloud computing cost may be causing an information technology industry crisis. Expanding requirements, extended transition schedules and misleading marketplace hype have made “Transformation” a dirty word. …
American Airlines Adopts Public Cloud Computing
Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the…
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. When I first read this, my immediate reaction was a resounding, “So what!” These results tell me that US Federal Government agencies are using US Government guidance to do their US Government job. Isn’t that what you would expect? Making an impression on me would require a study across multiple industry verticals. If other industries were voluntarily using the NIST Framework, that would be saying something!
Wouldn’t you know it, but such an independent study was actually conducted earlier this year. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries. This survey not only looked into cybersecurity practices of the US government and military, but it also delved into the security practices of other verticals including Energy/Utilities, Consulting, Information Technology and Banking/Finance. When asked about the specific security standards or frameworks their organization used, 53.1 percent of the respondents cited NIST! This response level was higher than those recorded for Information Technology Infrastructure Library (ITIL), ISO/IEC (International Organization for Standardization/International Electrotechnical Commission) HIPPA (Health Insurance Portability and Accountability Act of 1996), COBIT (Control Objectives for Information and Related Technology) and CMM (Capability Maturity Model). Yes, that impressed me.
When Paul Christman, vice president of federal for Dell Software was interviewed by FedScoop, a leading online publication that covers the US Government market, he said the framework is “just good policy”.
“It applies to schools, universities, hospitals, [the Defense Department], [the Intelligence Community], and civilian agencies. The document doesn’t say ‘This is how the government should protect the government,’ ‘This is how a bank should protect a bank.’ NIST was really trying to say ‘This wasn’t a government program or mandate;’ it’s just good practice.” Kent Landfield, director of standards and technology policy at Intel Security, echoed this sentiment saying that his company was able to fit the NIST recommendations nicely into the information technology security evaluation process as a whole.
And as if NIST had planned to stage an encore performance, two new standards – 800-173, Cloud-Adapted Risk Management Framework: Guide for Applying the Risk Management Framework to Cloud-based Federal Information Systems, and 800-174, Security and Privacy Controls for Cloud-based Federal Information Systems – are currently being drafted for released. According to Dr. Michaela Iorga, senior security technical lead for cloud computing at NIST, these new frameworks are designed to overlay and elaborate upon already-existing standards that lay out the basics for cloud architecture and security. Iorga also suggests that federal organizations should also use FedRAMP, CSA’s Security, Trust and Assurance Registry (STAR), and other certification and authorization programs to make decisions about cloud computing.
With all this new knowledge in my head, I really gained a new appreciation for NIST. The agency seems to be really taking a lead on protecting cyberspace across the board. As the economic value of our collective digital economy gains in importance, this relatively small agency has placed itself at the vanguard of cybersecurity and is truly living up to its mission:
To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
Thank you NIST!
(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2016)
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes