It’s an oft-repeated mantra: Organizations engaged in or investigating cloud computing in any of its many flavors are concerned about security. In fact, concerns about security, data privacy and data residency are often cited as inhibitors to cloud adoption. But are the concerns justified? Som...
Posts Tagged: Ethics
The three bills passed by the committee are the Personal Data Privacy and Security Act (S. 1151) sponsored by Judiciary Chairman Patrick Leahy (D-Vt.), the Data Breach Notification Act (S. 1408) sponsored by Sen. Dianne Feinstein (D-Calif.), and the Personal Data Protection and Breach Accountability...
Three bills cleared the Senate Judiciary Committee in a markup session yesterday, bringing federal standards for breach notification and data security one step closer to reality. The three bills, proposed by Chairman Leahy (D-VT), Senator Blumenthal (D-CT), and Senator Feinstein (D-NH), would requir...
The U.S. Labor Department should try to make the regulations governing the security of information at retirement plans and health benefits plans as similar as possible, and leave room for technology changes. The panel, better known as the ERISA Advisory Council, advises the U.S. Labor Department and...
via Fierce Government IT When it comes to gaps in technology standards for cloud computing, security and privacy stands out as the area with the most holes, according to a National Institute of Standards and Technology cloud computing standards roadmap released Sept. 13. The document identifies 11 s...
via RenewableEnergyWorld.com As the roll out of ‘smart’ and integrated technology becomes increasingly ubiquitous the challenges of ensuring the security of North American Critical Infrastructure increase. The security of these systems revolves around the dynamic prioritization of the se...
via Digital ID News When the National Strategy for Trusted Identities in Cyberspace was released in April some described it was “Woodstock for identity geeks.” Industry officials were excited to see the plan and hear what was announced, but there weren’t a lot of surprises. The goa...
via Government Computer News The rapid adoption of mobile computing is creating vulnerabilities and threats faster than they are being addressed, a panel of industry and government experts said on May 18. “Mobile is hot, and it will remain hot,” said John Landwehr, Adobe Systems’ s...