Author: James McCabe

Categories : Data Security            Leave a comment           

The Federal Government is increasingly focused on ways to expand the use of cloud computing to help meet increasingly constrained budgets and to increase efficiency. However, the security measures involved represent a whole new set of challenges. Not the least of which is the blurry line that starts to form at the “security perimeter”.  Gone is the well defined perimeter that comes with having systems and data “on-site,” controlled by government and contracted personnel.  Today, it has expanded to encompass […]