"I'll probably be hung for this, but I really believe the cloud can be more secure than what we do today," says CTO Tomas Soderstrom of NASA's Jet Propulsion Lab. "It's fairly uniformed, if you apply a patch, you can apply it to everything at once."
By working closely with cloud computing providers, IT leaders at NASA's Jet Propulsion Laboratory feel more confident about placing sensitive, mission-critical information securely in the cloud, says JPL CTO Tomas Soderstrom.
A new White House plan to reform how the feds manage IT should not only drive efficiencies but help secure digital assets, says Tim Young, former Office of Management and Budget deputy administrator for e-government and IT.
Cybersecurity reform stopped in the Senate, White House unveils new way to manage federal IT that emphasizes cloud computing and data consolidation and tips on preventing a WikiLeaks-style breach.
The plan calls on Federal CIO Vivek Kundra to publish within the next six months a strategy to accelerate the safe and secure adoption of cloud computing across the government.
Data centers are part of an ever changing world with challenges of high energy consumption, labor costs, data silos and growth in data volume. Learn how to meet these challenges with IBM's cohesive strategy for the development of a dynamic infrastructure, while also laying the foundation for a highly responsive...
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
"The first question they are going to ask the external provider is: 'What kind of procedures will you follow for physically securing the servers, for assuring the authenticity of the log-in, for security of the data during transit to and from your site?'" IBM's Dave McQueeney says.
The 90-page document defines common security and risk assessment requirements that qualified private contractors must meet to provide cloud computing services to federal agencies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.