Securing data in the public cloud isn't much different from other types of IT security. "It's the same advice we give for almost any deployment of IT because it is still the right thing to do," NIST Senior Computer Scientist Tim Grance says.
"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
"Okay, we have bad guys that might be in the system, but at least we're watching them every minute and hopefully detecting them before they do anything too bad," RSA Chief Technology Officer Bret Hartman says.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
From the White House to the State House, here are the 10 most important happenings in government IT security in 2010. Not everything promised at the beginning of the year came about as some had hoped. So, what else is new in government?
The innocent use for three years of a Yahoo calendar application exposed personally identifiable information of 878 patients at the Department of Veterans Affairs' Chicago Healthcare Systems, a violation of VA policy.
"I'll probably be hung for this, but I really believe the cloud can be more secure than what we do today," says CTO Tomas Soderstrom of NASA's Jet Propulsion Lab. "It's fairly uniformed, if you apply a patch, you can apply it to everything at once."
Incoming House Speaker John Boehner taps William McClellan "Mac" Thornberry, R-Texas, to coordinate a way to more efficiently address cybersecurity legislation in a Congress where nearly every committee has some sway.
By working closely with cloud computing providers, IT leaders at NASA's Jet Propulsion Laboratory feel more confident about placing sensitive, mission-critical information securely in the cloud, says JPL CTO Tomas Soderstrom.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.