by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January 2014
20 GCN JANUARY 2014 • GCN.COM 1. BRING YOUR OWN CLOUD SOFTENS THE SECURITY PERIMETER. The convergence of mobile and cloud computing is presenting a new and unintended hybrid: bring your own cloud. In 2014, government end users with mobile devices will knowingly or unknowingly tap consumer cloud services to store and access work data, moving it outside agencies' immediate control. Jerry Irvine, CIO of Prescient Solutions, calls the conver- gence, "an issue that is bringing in security risks." As consumer cloud services move data out of the enterprise, mobile devices provide new routes back in, another example of the "disap- pearing perimeter," says Paul Christman, Dell Software's vice president for the public sector. He calls the convergence a profound shift that will require greater attention to the security and management of mobile devices in the workplace, whether government-issued or bring your own device. "It represents another vector by which valuable government data can be lost or stolen," agreed Paul Royal, associate director of the Georgia Institute of Technology's Information Security Center. The vector also puts an emphasis on managing devices and protecting the data itself, no matter where it is stored. "The cost of doing this is coming down," Christman said, but the technol- ogy is not fully mature. Manoj Nair, senior vice president and general manager of cybersecurity firm RSA, said open and extensible security features for mobile devices are needed. He called upon Apple to open its iPhone 5s biometric to develop- ers. 2. FEDRAMP FOR MOBILE DEVICES IS ON THE TABLE. Mobility is becoming an essential part of the government IT enterprise at a speed barely conceivable a few years ago, and the pace shows no sign of slowing. An expanding mobile work- force, rising security concerns and IT consumerization present high hurdles for agency mobile IT managers in 2014. Agency CIOs initially supported the bring-your-own-device movement as long as end-user demands and service man- agement discipline were balanced. But this approach risks exposing government operations, confidential agency data and individuals' private information to marginal mobile security. While more sophisticated solutions are now in the offing, these are far from perfect. One approach involves creating guest networks that allow mobile devices to reach the Internet, but little else. Agencies are also setting up app stores to manage installation and updates of programs. But since application compatibility for multiple types of devices can't be ensured, expansion of these stores may be slowed. What's more, the next frontier of mobile devices will com- plicate these challenges, including progress on Google Glass, HTML5-capable tablets and special modules, which use a variety of run-time environments. All of this is pushing the federal government in the direction of setting up a certification and assessment process for mobile based on the Federal Risk and Authorization Management Pro- gram model for cloud networks. This would provide agencies a broad list of mobile devices pretested for compatibility with specific requirements. Federal CIO Steven VanRoekel has said mobile devices could be the next focus of this type of effort. WHAT'S AHEAD IN 2014 #1 #2