There are two trends that information security leaders should watch closely: The growing sophistication of fraudsters, and the concurrent "consumerization" of the workplace.
"The cloud is not such a special technology necessarily that it is exempt from a security perspective, but is just another implementation of IT, and is a natural evolution of where we come from," Federal CIO Vivek Kundra says.
The key tenet of the cloud is availability. But, asks the former White House official who led President Obama's Cyberspace Policy Review, where are the other cornerstones of information security: integrity and confidentiality?
In discussing Colorado's foray into cloud computing, Colorado Chief Information Security Officer Seth Kulakow discusses the demands the cloud presents governments and offers advice for IT security professionals on building their careers.
The Treasury Department blamed a cloud computing provider for the disruption of its website that provides the Internet face of the Bureau of Engraving and Printing, the agency that prints United States currency.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.