Remove .Net Remove Information Security Remove Internet Remove Meeting
article thumbnail

December 2011: GovCloud Moves From Policy to Law

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. One in particular is their recommendation for a National Office for Cyberspace (NOC) and a new National Security Council Cybersecurity Directorate (NSCCD). Cloud Musings by Kevin L. GovCloud Daily.

Policies 105
article thumbnail

NJVC's Kevin L. Jackson Co-Authors INSA White Paper on Cloud.

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Information security must be baked into the cloud computing architecture from the very beginning. Membership information available at https://www.ncoic.org/join/ ). GovCloud Daily.

Cloud 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Implementation of Cloud Computing Solutions in Federal Agencies

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variety of security concerns exist. Cloud Musings by Kevin L. Comments.

Cloud 115
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

So I started attending Black Hat, Def Con, and after many years wrote my own book on the insecurity of internet of things devices. Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. I also went after a CISSP certification. It’s simple things like that.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So it wasn't this story that we hear sometimes thrown around about Lightspeed net speed cyberattacks, you know it was human adversaries doing research on the environment, so the attack starts. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. When they did that.

System 52