Identity access management (IAM) is a critical requirement for effective cloud computing, regardless of the type of cloud model involved (e.g., SaaS, IaaS or PaaS). As more and more IT services are moved to the cloud, determining who has access to which cloud service is vital to ensuring privacy and security, as well as the overall performance of the cloud model. It also can be complex, especially when multiple cloud models delivering multiple cloud services are involved. More...

Choosing the right cloud partner is fundamental to achieving the full advantages of the cloud. It’s a challenging endeavor, however, in a market saturated with service providers of varying levels of experience, capabilities and track records. If you’re a federal government decision-maker, here are five key considerations to take into account in choosing a provider: security, scope, speed, sample and spend. I call them the five “S”s of a good cloud partner.Security More...

In its Guidelines on Security and Privacy in Public Cloud Computing, Special Publication 800-144, the National Institute of Standards and Technology (NIST) notes that organizations have a responsibility to “operate in agreement with established laws, regulations, standards, and specifications.” More...

Pages