‘We the People’ 2.0 to include APIs, Feds Want Secure Mobile with Back Door; Silent Circle Says No and more

WhitehouseHere are the top cyber news and stories of the day.

  • ‘We the People’ 2.0 to include APIs – “White House Deputy Director of Online Platform Peter Welsch wrote on the White House blog that Petitions 1.0, the code “We the People” runs on is complete, opening the door for the second version.” The code for the “We The People” 2.0 will feature APIs and allow users to retrieve data at all. Via FedScoop, more here.
  • Navigating the Security Maze for Cloud Computing - Ryan Kean of Kroger Company wrote on Wired about some ways to exploit cloud computing. The steps he suggests are to understand the benefits and risks, scrutinize the SLA, and reach out for resources. These steps can help improve the value-add of cloud computing, and help prepare the foundation for a move to that type of infrastructure. Via Wired, more here.
  • Feds Want Secure Mobile with Back Door; Silent Circle Says No – “The Federal Trade Commission earlier this week issued a report on mobile security, saying that people have an expectation of privacy for their personal information on smart phones. Only, certain elements of the government – let’s say the FBI – don’t want that information so secure that they can’t tap it themselves.” There is an unending struggle surrounding security in our government, as security can protect our citizens, it can also make life harder on law enforcement. Finding the happy medium between the two will be one of the larger struggles of our digital era. Via SV411, more here.
  • Juniper OS flaw crashes routers – “A serious flaw in the operating system running Juniper routers can make them crash and reboot, the network equipment vendor has advised.” A special TCP packet makes the kernel crash, and reboot. Juniper routers are used extensively in the network world, which makes this a potentially incredibly damaging  capability. Via SC Magazine, more here.
  • Wireless Carriers Leave Millions of Android Phones Vulnerable to Hackers – Android phones are being left out of key security updates by carriers, which is creating a terrible security paradigm for users. This is different than what happens to iOS devices, and the OEMs/Carriers need to make these updates happen more regularly, if just for the security of the user. Via Wired, more here.

Sign up for your free CTOvision Pro trial today for unique insights, exclusive content and special reporting.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.


Recent Research

What The Enterprise IT Professional Needs To Know About Git and GitHub

3D Printing… At Home?

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

About Ryan Kamauff

Ryan Kamauff is a senior analyst with Crucial Point LLC. He produces technology focused content for CTOvision.com and reports on analytical megatrends at the new analysis focused Analyst One.