• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE CLOUD COMPUTING AND HOMELAND SECURITY UPDATE

June 28, 2013 by

26 Jun 13. The military cloud: Balancing security and accessibility. The Defense Department’s long-term IT strategy calls for storing and
distributing virtually all data, even its most sensitive information, in the cloud. In January, the agency reported that it is fully committed to shifting to a cloud computing environment, citing cost, efficiency and user accessibility benefits. The CIA is already on the path to secure cloud services. After attempting to build a private cloud, the agency and other intelligence organizations opted to turn to commercial sources and awarded a contract to Amazon Web Services in late January. IBM protested the award to the Government Accountability Office, and GAO ruled in IBM’s favor. Negotiations to determine the final resolution are still under way, but observers expect the CIA to continue its migration to a
cloud-based system. Although cloud services are highly attractive to a DOD that’s facing both a tighter budget and soaring IT demands, some worry that the technology isn’t mature enough to ensure the safety of sensitive data shared between and within military organizations. Mark Cohn, chief technology officer at Unisys Federal Systems, based in Reston, Va., noted that it’s possible to argue that “cloud technology stacks are less mature in the sense that we don’t have as long a
history of defending them against the most sophisticated attackers at the level of national security systems, so [they] are therefore simply less proven.”
Robert Carey, DOD’s principal deputy CIO, acknowledged cloud risks in a recent DOD report, noting that “the metrics of cloud security are, at best, nebulous.” Carey added that the agency would need time to create secure cloud spaces. “We have lots of [pilot programs] going on…to make sure we understand…the pros, cons and risks of moving into the cloud space.” Although DOD has obvious reasons for approaching the cloud with caution, most experts believe it should be able to transition to a secure cloud environment without encountering any major problems. (Source: Defense Systems)

27 Jun 13. The Chinese government feels that it’s in the clear when it comes to stealing data from US companies using cyber tools, an issue leaders of the two countries will address next month as part of dialogues on cybersecurity, Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, said Thursday. Delivering remarks and taking questions at an event hosted by the Brookings Institution, Dempsey described the growth in data theft and the disagreement over its significance between senior US and Chinese officials. “China’s particular niche in cyber has been theft of intellectual property and I’ve had some conversations about that with them, and the conversations generally, we tend to agree to disagree,” Dempsey said. “Their view is that there are no rules of the road in cyber, there are no laws that they’re breaking. There are no standards of behavior, and so we have asked them to meet with us in order to establish some rules of the road so that we don’t have these friction points in our relationship.” The next round in the ongoing cyber dialogue, a dialogue that was initiated after US officials began to be more vocal about the threats emanating from China, is scheduled for next month. (Source: Defense News)

21 Jun 13. Coverage of the PRISM surveillance program highlights only the most recent example of personal data ending up in the hands of unintended parties. While most attention has been placed on consumer public cloud services such as Gmail and Facebook, many corporate CISOs and CIOs are now re-evaluating the risks of third party access and surveillance to corporate cloud services. Regardless of whether these third parties are governments, cyber-activists, or cyber-criminals, the message is becoming clear – when enterprises put their information into shared cloud services, such as SaaS applications, they need to carefully think through the implications of giving awa

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    May 20, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    May 20, 2022
    Read more
  • CONTRACT NEWS IN BRIEF

    May 20, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT