G7 sets financial sector cyber defence guidelines as attacks grow

Computer Weekly

G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec

U.S. Department of Defense sets its cloud security guidelines

Cloud Musings

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month.

Trending Sources

Easy-to-follow Guidelines to Find the Best Offshore Software Development Company


Before discussing the guidelines to find the best offshore software development company, let’s discuss briefly the reasons to outsource. To simplify the process, here we explain some easy-to-follow guidelines which can help in selecting the right outsourcing partner.

Government announces digital apprenticeship service as part of apprenticeship levy guidelines

Computer Weekly

The government has released guidelines for the upcoming apprenticeship levy, including how businesses can access funds to train apprentices

Vendors approve of NIST password draft

Network World

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.

Putting Pen to Paper – Four Essential Factors to Calculating TCO on UPS Equipment

Data Center Knowledge

Learn how to make your UPS - with up to a 20-year lifespan - as efficient as cost-effective as possible by following four guidelines. Read More. Industry Perspectives

Many UK local councils still unprepared for GDPR, ICO survey shows

Computer Weekly

The ICO fines the Norfolk Council as it publishes GDPR guidelines for local councils after a survey revealed not all were up to speed in preparations to comply with the new data protection law

Government Clouds: What is a FedRAMP?

Data Center Knowledge

Actually, the guidelines can help everyone because the FedRAMP. What is FedRAMP? It''s a secure government cloud that meets specific requirements.

Open Group Publishes Guidelines on Cloud Computing ROI

Cloud Musings

Open Group Publishes Guidelines on Cloud Computing ROI. Open Group Publishes Guidelines on Cloud Computing. Cloud Musings by Kevin L. Jackson. Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Pages. Cloud Musings on Forbes. NJVC Cloud Computing. GovCloud Daily. GovCloud Presentations. GovCloud on Facebook. Get "Cloud Musings" by RSS. Posts. Posts. Comments. Comments. Thursday, April 29, 2010.

Congress just dismantled FCC rules protecting web browsing history: What it means

Tech Republic Security

Republicans in Congress just voted to strip away guidelines protecting web browsing data for consumers, in a landmark victory for ISPs including AT&T, Verizon, and Comcast

IDG Contributor Network: IoT security principles from Homeland Security

Network World

Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs. The danger is real. The U.S.

8 steps to regaining control over shadow IT

Network World

These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise.

Email Etiquette

IT Toolbox

My past experience tells me that these are guidelines on how to compose, respond and basically how to use email as a communication tool. What is email etiquette? Another question is should this be taught at some point and time to everyone

Fed Tech Roundup August 3


DISA updates draft cloud security guidelines - GCN.com. Help Us Add Resources to the Updated Mobile User Experience Guidelines! The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid. Banks And Insurance Companies Aware Of Cyber Risks: Opportunities Remain To Become More Resilient.

Why You Need to Rethink Your IT Operating Model


Data Strategy Over Ownership: Coherent strategy and guidelines around data allow for rapid exploitation by distributed teams. The current wave of digitization disrupting the world’s companies is broader than past efforts.

Corporate IT: How to Get the Most From an IT Roadmap


Following three simple guidelines can improve communication across IT. For over 50 years the advertising industry has proved that images are a far more effective way to get a message across that using words alone.

Building a More Effective and Successful ERP Team

IT Toolbox

While preparing to assemble your team, keep these five guidelines in mind. Building a more effective and successful enterprise resource planning (ERP) team is more complicated than asking friends co-workers or seeing who’s available. To ensure project success, you must create a healthy, productive structure while assembling a group of people who can work together well. Common

Social Media Checkup: Healthcare Industry Growing Stronger

CIO Dashboard

Now that the FDA guidelines for social media usage are starting to shape-up, it is expected that medical device and pharma companies will begin to more actively use this platform to influence, educate, and empower consumers. Guest post by Adam Roumm.

IT Project Management: The PMO’s Role in Agile Organizations


Digitization has become one of the most important strategic priorities for thousands of companies across the past few years and so, without doubt, is now the most important priority on many CIOs’ desks.

Putting Together Your LAN Troubleshooting Toolkit

IT Toolbox

Here are some guidelines After seeing this smorgasbord of equipment available for helping you to test and troubleshoot your network, the next logical question is, "Which tools should I purchase for my network?"

Government Cloud Achilles Heel: The Network

Cloud Musings

They also need to evaluate the numerous permutations of business function, data user role, location of access, legal or regulatory guidelines and user devices. Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue.

IBM Watson/ XPrize open $5 million AI competition for world-changing applications

Network World

IBM and the XPrize organization have opened registration and set guidelines to competing for a $5 million purse to those interested in building advanced AI-based applications that could address the world’s biggest issues – everything from clean water to better energy resources.

Cloud Computing Forensics Readiness

Cloud Musings

The responsibility of any external party should be determined in advance and made clear relevant policies, guidelines and agreements. Photo credit: Shuterstock In today’s globally connected world, data security breaches are bound to occur.

U.S.-Japan Rebalancing


The United States and Japan just released their Interim Report on the Revision of the Guidelines for U.S. Japan Defense Cooperation. Available here: [link] Anyone who works U.S.-Japan Japan interoperability issues (from policy to technology) will be interested in the language contained in the report, which is basically an action item from the last U.S. Japan Security Consultative Committee (SCC) (aka: 2+. To read more please log in. Login.

Fed Tech Roundup September 4


New Guidelines Require Warrants For Federal Surveillance of Cellphones - Yahoo Tech. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Mitre to Support Auburn University’s Drone Pilot Training Program. Feds Will Need Warrant to Use Cellphone Scanning Technology Known as 'Stingrays' - ABC News. No Organization Can Defend Themselves By Themselves Anymore.

Frame Relay Physical Layer Options and Frame Formats

IT Toolbox

In addition to these guidelines, the UNI IA acknowledges that other interfaces, such as ISDN, may be used as appropriate. For example, MCI currently offers frame relay as a switched digital service at 56/64 Kpbs, and also as a fractional T1 service, Nx56 or Nx64 Kpbs

May the Fourth be with you on World Password Day

Network World

Although NIST closed comments on for its Digital Identity Guidelines draft on May 1, VentureBeat highlighted three big changes. Get ready to be bombarded with “May the Fourth be with you” puns regarding your passwords and identity, as this year May 4 is not only Star Wars Day but also World Password Day.

Fed Tech Roundup September 11


States rush to regulate drones ahead of federal guidelines - GCN.com. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. NASA Invites Media to Explore Mars Science Fiction and Fact in Cinema. How Can Agencies Balance IT Innovation and Cost Savings? Nextgov. GAO dings IRS, Secret Service techs-up for pope and more - FCW.com.

Cybersecurity Standards and Your Enterprise


As we have noted in the past, “The nice thing about standards is that you have so many to choose from” teaches Andrew S. Tanebaum in his classic text on Computer Networks. This adage is especially true when it comes to cybersecurity.

Tech News Roundup February 19


DHS issues cyberthreat information sharing guidelines, enhancing the utility of NCCIC. Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. 29th Annual Leukemia Ball Preview with Event Co-Chairman Ed Offterdinger. Apple-FBI fight over iPhone encryption pits privacy against national security - Los Angeles Times. Apple likely to invoke free-speech rights in encryption fight - Reuters.

Enterprise Networking in a Cloud World

Cloud Musings

This leads to an increased need to categorize those assets and apply appropriate security controls with respect to business/mission functions, data user role, location of access, legal/regulatory guidelines and user devices.

Everything You Know About eAuthentication is wrong!


On Labor Day, September 5 th 2016, NIST published their Digital Authentication Guideline: Public Preview. The base document SP 800-63-3 is the third iteration of this special publication, and has been renamed to: Digital Authentication Guideline. Nathaniel Crocker.

SMS-based two-factor authentication may be headed out the door

Network World

Its latest draft of its Digital Authentication Guideline, updated on Monday, warns that SMS messages can be intercepted or redirected, making them vulnerable to hacking. SMS messaging for two-factor authentication might become a thing of the past. A U.S. federal agency is discouraging its use. The National Institute of Standards and Technology is pushing for the change.