In its Guidelines on Security and Privacy in Public Cloud Computing, Special Publication 800-144, the National Institute of Standards and Technology (NIST) notes that organizations have a responsibility to “operate in agreement with established laws, regulations, standards, and specifications.” Plus...

Cloud was just about everywhere at the Healthcare Information and Management Systems Society (HIMSS) Conference and Exhibition in Las Vegas last week. Of the 1,100 exhibitors, almost all cited cloud in their offerings in some way. There seemed to be as many cloud definitions as there were vendors—creating significant confusion for the record-setting 37,000+ attendees. Plus...

Cloud computing offers state and local governments a real opportunity to meet many technical and budgetary challenges by delivering applications, platforms and infrastructure without ownership or capital investment. Wouldn’t it be great if there was a central place to learn more about the technology, outstanding issues, implementation requirements and real-life, working examples in this sector? Fortunately, now there is. Plus...

As a Cloud Service Provider (CSP) on GSA’s Infrastructure as a Service (IaaS) BPA, CGI has learned we must help our customers understand the extent of the security features they inherit from our certified IaaS services. GSA appropriately made these boundary distinctions a key issue during the risk assessment process. Since different CSPs have chosen different boundaries, it is very important that customers be aware of the extent of the security provided with their IaaS.   Plus...

Building security into the System Development Life Cycle (SDLC) is a basic security principle, but one not always well followed. When it is, the result speaks for itself: a more secure system. For CGI, following this “security first” principle enabled us to become the first certified Cloud Service Provider (CSP) to deliver secure cloud services under GSA’s Blanket Purchase Agreement (BPA) for Infrastructure as a Service (IaaS). Our approach also makes it easier to comply with new forthcoming FedRAMP requirements. Plus...

In early December, I was invited to speak at the second annual UP 2011 Cloud Computing Conference. As more organizations turn to cloud computing, one of the pressing needs that must be addressed is the development of identity access management standards. In my presentation, I discussed the work that’s underway to develop standards and some of the issues each standards organization must resolve. Plus...

Two weeks ago, Brian Cann and I gave a presentation on "the complete cloud" at the Gartner Symposium ITxpo in Orlando. Attendance was standing-room-only, with many excellent questions indicating the high level of interest among the audience of government and commercial executives as they make their moves into the cloud. Plus...

The cloud buzz in the CGI booth at the Association of the U.S. Army (AUSA) annual meeting last week was palpable and not surprising given the growing number of cloud RFIs that we’ve seen lately from the defense and intelligence community. Plus...

This is turning out to be a busy summer. The influx of federal cloud RFIs from April and May are continuing, and, since June, they are transforming into RFQs, which indicates positive momentum in the federal government’s adoption of cloud computing.Two more factors emerged last week to drive that momentum. Plus...

Security is at the top of IT executives’ concerns in adopting cloud computing. Almost every major study confirms this. At the time of this post, even our own informal poll on the CGI.com homepage has 55% of 2,400 respondents citing “security risks” as their biggest concern in moving to the cloud.Yet, amid these concerns, cloud adoption is ramping up, with the industry quickly weighing the risks and rewards, and learning how to best manage those risks.Case in point… Plus...

Pages