‘We the People’ 2.0 to include APIs, Feds Want Secure Mobile with Back Door; Silent Circle Says No and more

WhitehouseHere are the top cyber news and stories of the day.

  • ‘We the People’ 2.0 to include APIs – “White House Deputy Director of Online Platform Peter Welsch wrote on the White House blog that Petitions 1.0, the code “We the People” runs on is complete, opening the door for the second version.” The code for the “We The People” 2.0 will feature APIs and allow users to retrieve data at all. Via FedScoop, more here.
  • Navigating the Security Maze for Cloud Computing - Ryan Kean of Kroger Company wrote on Wired about some ways to exploit cloud computing. The steps he suggests are to understand the benefits and risks, scrutinize the SLA, and reach out for resources. These steps can help improve the value-add of cloud computing, and help prepare the foundation for a move to that type of infrastructure. Via Wired, more here.
  • Feds Want Secure Mobile with Back Door; Silent Circle Says No – “The Federal Trade Commission earlier this week issued a report on mobile security, saying that people have an expectation of privacy for their personal information on smart phones. Only, certain elements of the government – let’s say the FBI – don’t want that information so secure that they can’t tap it themselves.” There is an unending struggle surrounding security in our government, as security can protect our citizens, it can also make life harder on law enforcement. Finding the happy medium between the two will be one of the larger struggles of our digital era. Via SV411, more here.
  • Juniper OS flaw crashes routers – “A serious flaw in the operating system running Juniper routers can make them crash and reboot, the network equipment vendor has advised.” A special TCP packet makes the kernel crash, and reboot. Juniper routers are used extensively in the network world, which makes this a potentially incredibly damaging  capability. Via SC Magazine, more here.
  • Wireless Carriers Leave Millions of Android Phones Vulnerable to Hackers – Android phones are being left out of key security updates by carriers, which is creating a terrible security paradigm for users. This is different than what happens to iOS devices, and the OEMs/Carriers need to make these updates happen more regularly, if just for the security of the user. Via Wired, more here.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.


Recent Research

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

Navy continues to invest in innovation: Review their S&T efforts here

MSPA Unified Certification Standard For Cloud Service Providers: Is This A Commercial Version of FedRamp?

Watch Ben Fry And His Visualizations: Multiple use-cases come to mind, including national security efforts

Agenda And More Details for 4-5 March NIST Data Science Symposium

Actionable Insights From AFCEA Western Conference and Exposition 2014

About Ryan Kamauff

Ryan Kamauff is a senior analyst with Crucial Point LLC. He produces technology focused content for CTOvision.com and reports on analytical megatrends at the new analysis focused Analyst One.