Known as the Cloud First policy, Federal CIO Vivek Kundra has outlined a new policy in which one-quarter of the $80 billion the federal government spends on information technology would employ cloud computing solutions.
Attracting and retaining IT security professionals may be the No. 1 staffing challenge states face, but the numbers alone unveiled in a recent National Association of State Chief Information Officers survey don't tell the whole story.
Clinics applying for HITECH Act electronic health records incentive payments are getting a reminder about the importance of information security, says Robert Tennant of the Medical Group Management Association
Interest in cloud computing is on the rise, but security concerns linger. This white paper addresses how to mitigate those risks, including:
Developing a secure, holistic infrastructure that encompasses both physical and virtual computing systems;
Establishing high-level information security policies for...
Organizations investigating cloud computing must consider many different options, including public, private and hybrid clouds. And each approach poses different risks. This white paper addresses:
Choosing a cloud computing solution;
Addressing the risks associated with moving to the cloud;
Planning IT services...
Security professionals at organizations adopting cloud computing solutions must put in place policies, processes and relationships that will result in keeping enterprise data safe. This industry perspective recommends:
Adopting high-level information security policies as well as granular procedures and standards...
This paper proposes a four-layer model called the "security stack" as a
means to visualize the complexity of cybersecurity problems and see through
to comprehensive, effective solutions. The authors use the term "stack"
strictly as having similarities to other well accepted stacks where layers
Office of Management and Budget Director Jacob Lew issues a directive to require 5.7 million federal employees and contractors to use personal identity verification credentials to access federal IT systems and facilities by Oct. 1.