Having data available anytime, anywhere has long been touted as a major benefit of cloud computing, but a top Defense Information Systems Agency official said where data is physically located still matters.
Federal agencies are utilizing more commercial satellite communication services and turning to a joint General Services Administration-Defense Department contract vehicle to help them acquire solutions, according to a Jan. 9 post to the General Services Administration blog.
The Defense Information Systems Agency Jan. 13 publicly released guidance that updates and codifies enhanced cybersecurity requirements for implementing and hosting cloud computing systems for certain types of sensitive Defense Department data.
Congressional investigators say the Homeland Security Department and other agencies have taken few steps to address potential cyber threats to building and access control systems within federal offices, labs and warehouses.
Researchers said understanding the level of uncertainty in computational models, which are used in designing such systems, is a difficult mathematical challenge because of the many variables involved.
While a reported cyber attack on a German industrial plant last year may not have risen to the level that the damaging Stuxnet computer worm could have inflicted, a well-regarded Washington, D.C., cybersecurity expert said it was pretty close.
For the United States to maintain its influential position, Melissa Hathaway writes that it must develop and deliver "a new message focused on economic competitiveness and business opportunity that respects the rights of individuals in their liberty, thoughts, and possessions."
The Defense Department's information technology agency is seeking information about next-generation security capabilities that would protect complex systems against advanced persistent threats.
The National Security Agency recently released more than a decade's worth of intelligence collection reports that may have violated U.S. law or policy, according to s everal news organizations.
The DHS inspector general said the department has generally improved the security of its information systems – including trusted Internet connections, continuous monitoring and strong authentication – in line with the Federal Information Security Management Act, which provides a standard baseline that agencies should comply with. However, agencies within DHS aren't consistently following certain policies and procedures.