Department of Energy gets IG Report, US Energy Grid is increasingly susceptible to attack and more

Here are the top cyber news and stories of the day.

  • Cisco Systems to buy Meraki for $1.2 billion - Cisco announced on Sunday that it would be buying Meraki, a cloud solutions provider, for $1.2B. This purchase is intended to help Cisco reach $1B in annual revenue, as well as prop up their cloud computing portfolio. “Meraki technology offers customers Wi-Fi, switching, security and mobile device management centrally managed from the cloud.” Via Bennington Banner, more here.
  • NRC: U.S. Energy Grid Increasingly Susceptible to Terror Attack - A recent report by the National Research Council stated that a terror attack on the US power grid could “cause massive blackouts and cost the country billions.” The NRC found that high-voltage transformers are especially susceptible to both physical and information technology infrastructure attacks. High-voltage transformers are often custom made as well as manufactured out of the US. The report suggests that energy companies stockpile and develop better recovery transformers in the future. Via Property Casualty 360, more here.
  • Army data tracker improves unit readiness evaluations - The Enterprise Management Decision Support system is a tool for senior Army leaders which tracks key data that determines an individual unit’s readiness. This system resides on the SIPRNet and queries over 20 US Army databases which hold information such as rank, MOS qualifications, medical readiness and more. It then provides instantaneous results to the user. In 2013, upgrades to the process and enhanced information will be rolled out. Via Fort Gordon Signal, more here.
  • Dozens of cyber vulnerabilities found at Department of Energy facilities – The US DoE IG found 38 cyber vulnerabilities in their 2012 study of the DoE. This is down from 56 last year, but 16 of the 2011 vulnerabilities remain unfixed. In addition, the DoE was found to have troubles with actually physical security and access rosters. Via Killer Apps, more here.
  • Continuous monitoring: A piece of the IT security puzzle – This Government Computer News article takes a look at how Federal IT security pros are looking at continuous monitoring. While it is required for FISMA compliance, they are seeing it as a means to an end, not the end itself. Via Government Computer News, more here.
  • Cyber Chief Alexander Issues Call For Action; Outlines Who Does What - In a symposium last Wednesday, General Alexander (DIRNSA/USCYBERCOM Commander) outlined where he sees cyber responsibilities landing. Transparent processes and a civilian leader (DHS) are key in his mind. Additionally, he asked that private firms increase their security posture to better protect everyone. Via AOL Government, more here.
  • Pentagon and Reid back cyber exec order, legislation still preferred - After the Cybersecurity Act of 2012 was shot down in congress, an executive order from the White House is being drafted. Top DoD officials see it only as a “stop gap” on the way to better cybersecurity legislation. Senator Harry Reid (a proponent of the 2012 act) says much the same. Via Killer Apps more here.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.

 

Recent Research

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

Navy continues to invest in innovation: Review their S&T efforts here

MSPA Unified Certification Standard For Cloud Service Providers: Is This A Commercial Version of FedRamp?

solid
About Ryan Kamauff

Ryan Kamauff is a senior analyst with Crucial Point LLC. He produces technology focused content for CTOvision.com and reports on analytical megatrends at the new analysis focused Analyst One.