"I'll probably be hung for this, but I really believe the cloud can be more secure than what we do today," says CTO Tomas Soderstrom of NASA's Jet Propulsion Lab. "It's fairly uniformed, if you apply a patch, you can apply it to everything at once."
Incoming House Speaker John Boehner taps William McClellan "Mac" Thornberry, R-Texas, to coordinate a way to more efficiently address cybersecurity legislation in a Congress where nearly every committee has some sway.
By working closely with cloud computing providers, IT leaders at NASA's Jet Propulsion Laboratory feel more confident about placing sensitive, mission-critical information securely in the cloud, says JPL CTO Tomas Soderstrom.
A new White House plan to reform how the feds manage IT should not only drive efficiencies but help secure digital assets, says Tim Young, former Office of Management and Budget deputy administrator for e-government and IT.
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
"The first question they are going to ask the external provider is: 'What kind of procedures will you follow for physically securing the servers, for assuring the authenticity of the log-in, for security of the data during transit to and from your site?'" IBM's Dave McQueeney says.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.