article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

The only way forward is to learn from mistakes and failures (in her accident's case, a clip that was not put back in the breaking mechanism that sent her and her car hurling through the safety sand and net at the end of the drag strip). Those are opportunities to get better, not excuses to give up or avoid future failures.

Security 103
article thumbnail

Implementation of Cloud Computing Solutions in Federal Agencies

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variety of security concerns exist. Cloud Musings by Kevin L. Comments.

Cloud 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

December 2011: GovCloud Moves From Policy to Law

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Pressure to reduce budget, pressure to manage I resources better and the political pressure of the next presidential election will combine to accelerate adoption. Cloud Musings by Kevin L.

Policies 105
article thumbnail

NJVC's Kevin L. Jackson Co-Authors INSA White Paper on Cloud.

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Cost savings must also consider the entire IT lifecycle, not periodic budget cycles. Information security must be baked into the cloud computing architecture from the very beginning.

Cloud 90
article thumbnail

NJVC® Unveils Cloudcuity? Umbrella Framework for NJVC Cloud

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. In addition, the portal: Applies advanced monitoring and analytic tools to ensure compliance with budgets and SLAs. Cloud Musings by Kevin L. Cloud Musings on Forbes. NJVC Cloud Computing.

Cloud 116
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? Vamosi: And that’s just a drop in the ocean for how many more information security people are needed today.

article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

Baccio: So if you are a net defender, take this research and use that to inform your strategy. Do we put it in our budget? And I think as a net defender, it's really bad news for all of us. It’s a clever way for malware to be monetized. Vamosi: Dwell Time. Yeah, we're pretty sure we're gonna get ransom this year.

Malware 40