GovDefenders Wednesdays | Cloud Security Alliance Warns Providers Of ‘The Notorious Nine’ Cloud Computing Top Threats In 2013

The Cloud Security Alliance (CSA) Top Threats Working Group today released, The Notorious Nine: Cloud Computing Top Threats in 2013 - a revised report aimed to provide organizations with up-to-date, expert-informed understanding of cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. Today's review: Data Breaches.

Autodesk Volunteers Help Preserve Historic Kosrae Using Reality Capture Software & BIM

Kosrae is an island in the South Pacific, whose rich history is unknown by the people who live there, as well as the handful of scuba divers who visit annually to explore the pristine coral reefs surrounding the island. That’s why Autodesk is teaming up with KnowledgeWell (a non-profit dedicated to transforming the barriers faced by under-resourced nations into opportunities for successful business and public sector programs) to create a 3D model of the island and help tell its story to the rest of the world.

Technically News – 3/25

This week in Technically News: Amazon Reportedly Signs $600M Cloud Deal With CIA; Data-Centric Cybersecurity in the Time of Shared Infrastructures; US Expanding Cybersecurity Watch; The Public Sector Needs Proactive Cybersecurity; Cybersecurity: Crime, Warfare, or Scaremongering.

GovDefenders Wednesdays | The Hacker's Place in Government Cybersecurity

Andrew "weev" Auernheimer will spend the next 41 months in federal prison. His crime? In 2010, he exposed a security flaw in AT&T's iPad user database, gaining access to the information of over 100,000 people. I want to ponder this question I asked myself after reading about Andrew: what role can public hackers play in government cybersecurity?

More Cloud FUD: Data Portability & Cloud Lock-in

A while back, I took the folks over at RackSpace to task for spreading fear, uncertainty, and doubt (FUD) concerning Cloud APIs. Luckily for all involved they simmered down on the subject (which most likely had nothing to do with my little article), and now the OpenStack project that RackSpace incubated doesn't look like the Chicken Little of the open source software world anymore. However, just like that game of whack-a-mole, we've got another FUD top-ten hit ripping through the charts: Data Portability & Cloud Lock-in.

GovDefenders Wednesdays | 2012 FISMA Report Key Takeaways

The White House recently released the 2012 Federal Information Security Management Act report. The report tracks agencies’ progress toward reaching the compliance targets set in 2002’s Federal Information Security Management Act (FISMA). While the report documents some improvements and an increase in spending (up a $1 billion from 2011), it also highlights areas of weaknesses that help illuminate the current government cybersecurity ecosystem.