Governments have been slow to move their core systems to the cloud because they believe vendors can’t provide the level of security and scalability they need. It is understandable that governments – which are sometimes holding information that if stolen, could threaten national security – take extra precautions to make sure infrastructure is completely secure. But these concerns are no longer warranted and recently, forward-thinking public sector agencies are quickly gaining more confidence in public cloud services. A group of tech chiefs gathered in Canberra at a CIO roundtable lunch- in partnership with Virtustream - to discuss the challenges and issues they face when moving core infrastructure to the cloud.
Cyber criminals became “more ambitious in 2016” and cultivated advanced attack strategies as targeted attacks shifted from economic espionage to politically-motivated sabotage and subversion, according to a new global threat report from Symantec.
Although deploying hybrid cloud infrastructure seems like the most popular strategy, some CIOs have decided to go all-in with the public cloud as they don't see any value in maintaining even part of their infrastructure on-premise.
The National Democratic Institute has workers in 65 countries -- not all of them friendly. To support its growing global mission, and to improve efficiency without buying more hardware, the nonpartisan nonprofit has spent the last four years migrating to the cloud.
Cloud services can help CIOs free themselves from worrying about managing data centers, scaling capacity, configuring servers, applying security patches and other routine maintenance so they can focus on providing insight to improve the business.
As tech behemoths Google and Microsoft try to win over public-sector CIOs with their cloud-based productivity suites, government agencies eye cost savings and an increase in productivity and collaboration.
This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.