Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan

Blog Feed Post

BlackBerry taps Trend Micro for app screening, DoE hit by ‘sophisticated’ cyber attack and more

By

blackberry-10-sign-bgrHere are the top cyber news and stories of the world.

  • BlackBerry signs up security firm to screen third party apps – BlackBerry has signed a contract with Trend Micro to screen all their App World submissions. This is a solid move, to further enhance BlackBerry’s reputation for security. While no app screening is perfect, it does provide value add. Via Mobile News UK, more here.
  • Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications (WHITE PAPER) – The Air Force Research Laboratory (AFRL) recently released a white paper on SecureView collaboration with Intel and Citrix. “”Client strategies for the U.S. Government must be affordable and readily deployable while meeting the most stringent requirements for data security and operational efficiency.  At the request of a customer, AFRL engaged with Intel and Citrix to create SecureView, a solution that expands on capabilities in Citrix XenClient* and 2nd- and 3rd-generation Intel® Core™ i5 and i7 vPro™ processors to meet these requirements.”" Via FedScoop, more here.
  • Does cloud-based EHR increase health data security? – Like it or not, electronic health records are the new wave, implementation and integration are the next problem. Concerns of privacy and security plague EHR implementation, but cloud-based EHR could help deal with some of these problems. Via EHR Intelligence, more here.
  • Department of Energy hit by ‘sophisticated’ cyber-attack – and authorities believe Chinese hackers could be behind it -
    The DoE was hacked two weeks ago in a ‘sophisticated’ attack. The report came from the Washington Free Beacon and seems to point fingers at the Chinese. Via Daily Mail, more here.
  • FedRAMP grants second security authorization – The second FedRAMP authorization is going to CGI Federal. It “covers CGI’s infrastructure as a service offerings, including virtual machines and web-hosting capabilities, available for agencies to acquire from the General Services Administration’s IaaS blanket purchase agreement, according to GSA Associate Administrator Dave McClure.” The FedRAMP program will not be effective until many solutions are authorized, not just two. Via FedScoop, more here.
  • Law enforcement slow to adopt cloud computing - A Ponemon Institute report, released 31 Jan, found that 46% of law enforcement agencies are not considering cloud computing. The FBI Criminal Justice Information Services (CJIS) standards make it hard for adoption. Via FierceGovernmentIT, more here.
  • GAO: FCC failed to protect information – “The Federal Communications Commission failed to implement appropriate information security controls in the initial components of the Enhanced Secured Network project, the Government Accountability Office said in a new report.” The FCC has a ton of IP that passes through their doors, and they need to be exceedingly careful. Via FedScoop, more here.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

CloudEXPO Stories
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-centric compute for the most data-intensive applications. Hyperconverged systems already in place can be revitalized with vendor-agnostic, PCIe-deployed, disaggregated approach to composable, maximizing the value of previous investments.
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.