The Lighter Side Of The Cloud – Dark Clouds
The Lighter Side Of The Cloud – 7:24 AM
The Lighter Side Of The Cloud – Thunderstorm

Cybersecurity Act Of 2012 And The Cloud

Cybersecurity Act of 2012 and the Cloud

Speaking of Laws and Regulations Governing the Cloud Computing Environment, we cannot ignore the latest cybersecurity bills proposed this year. There have been many cyber bills proposed, but none was as important as the Cybersecurity Act of 2012, supported by the Obama Administration. Cybersecurity is a top administration priority for Obama’s second term. His approach to IT security will influence the U.S cloud computing environment over the next four years.

When it comes to cloud computing, security is top-of-mind for each institution, public and private. In a recent study, defense contractor Lockheed Martin and its Cyber Security Alliance partners acquired feedback from government agencies in an effort to measure attitudes around cloud computing and cybersecurity. 85% of government technology decision makers cite cybersecurity as a high priority, with at least one or more related initiatives underway.

This year, in July, senators Joseph Lieberman and Susan Collins proposed the Cybersecurity Act of 2012 . The act would have required companies to voluntary create best practices for the protection of key infrastructures from cyber attacks. In August, The Cybersecurity Act of 2012was defeated in the Senate, but President Obama continues to support some of the cyber security standards.

The Cybersecurity Act of 2012 sets cyber security standards for critical infrastructure, and encourages information sharing on cyber threats between businesses and the U.S. government. Data breach or intrusion risks are seen to be higher for any company that stores personal information or that operates in the cloud.

The Cybersecurity Act of 2012 is the product of a public-private partnership and would:

  •    Allow private industry groups to develop and recommend voluntary cybersecurity best practices
  •    Allow owners of critical infrastructure to participate in a voluntary cybersecurity program.
  •    Permit information-sharing among the private sector and the federal government.
  •    Require designated critical infrastructure to report cyber incidents.

The Obama Administration has been particularly focused on improving government services through the use of cloud computing technologies. Government agencies using cloud computing technologies should keep a close eye on The Cybersecurity Act. No matter the outcome of the legislation, companies still have to ensure that they are compliant with existing laws with respect to cybersecurity.

By Rick Blaisdell

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Popular

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Wearable Tech – Will It Ever Be Fashionable?

Wearable Tech – Will It Ever Be Fashionable?

Wearable Tech – Will It Ever Be Fashionable? Wearable tech is taking over the world, and in that sense, it’s already fashionable. As we noted last week, the sector is expected to grow from $14 billion in 2014 to $70+ billion in 2024. But what about ‘high-fashion’? The catwalks and runways of London, Paris, and Milan? Can…

Recent

The Importance Of Cloud Security For Wearable Technology

The Importance Of Cloud Security For Wearable Technology

Wearable Technology Starts With Cloud Security The integration of wearable technology into our society is all but inevitable. Today, major players in the wearable tech field include Google, Fitbit, Boston Scientific and Apple. As users continue to demand ever increasing availability and functionality from their devices, so do security concerns for wearable tech. The future…

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines for Maximum Upselling and Cross-Selling in a World Gone Cloud With the growth of the subscription economy, companies can no longer assume that a sale means that the deal is closed. Companies need to prove their worth every minute of every hour, every hour of every day and so on. A big…

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security Over the past decade, drones, also known as UAVs (unmanned aerial vehicles), have become a fact of life. Beginning as underpublicized but extremely effective items in the U.S. military’s arsenal, drones have since come into wide use by government agencies for everything from geographic surveys to law…

Contact Us

Sending
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising