Remove .Net Remove Budget Remove Groups Remove Information Security
article thumbnail

Implementation of Cloud Computing Solutions in Federal Agencies

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variety of security concerns exist. Cloud Musings by Kevin L. Comments.

Cloud 115
article thumbnail

December 2011: GovCloud Moves From Policy to Law

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Pressure to reduce budget, pressure to manage I resources better and the political pressure of the next presidential election will combine to accelerate adoption. Cloud Musings by Kevin L.

Policies 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NJVC® Unveils Cloudcuity? Umbrella Framework for NJVC Cloud

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. In addition, the portal: Applies advanced monitoring and analytic tools to ensure compliance with budgets and SLAs. Connect via: CLOUD COMPUTING WORKING GROUP. Cloud Musings by Kevin L.

Cloud 116
article thumbnail

NJVC's Kevin L. Jackson Co-Authors INSA White Paper on Cloud.

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Cost savings must also consider the entire IT lifecycle, not periodic budget cycles. Information security must be baked into the cloud computing architecture from the very beginning.

Cloud 90
article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

PBS : Judy Woodruff: Officials confirm that a Russian criminal group is behind the hacking of a crucial energy pipeline. One group was Conti, and internal chats were exposed. I am a global security adviser at Splunk. And I work on a team called surge which is primarily a research group focused on security.

Malware 40
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? Vamosi: And that’s just a drop in the ocean for how many more information security people are needed today.