{"id":16120,"date":"2015-07-22T15:00:00","date_gmt":"2015-07-22T15:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3377431"},"modified":"2015-07-22T15:00:00","modified_gmt":"2015-07-22T15:00:00","slug":"what-should-come-from-the-cybersecurity-sprint-cloudexpo-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/what-should-come-from-the-cybersecurity-sprint-cloudexpo-cloud\/","title":{"rendered":"What \u2018Should\u2019 Come from the Cybersecurity Sprint | @CloudExpo #Cloud"},"content":{"rendered":"<p>So, in the wake of the OMB hack, the federal CIO (Tony Scott) has directed government agencies to get serious about cyber security. The \u201c30-day sprint,\u201d directs agencies to patch all known vulnerabilities; use information provided by Homeland Security to identify and mitigate known threats; limit the number of privileged users and tighten access controls; and \u201cdramatically accelerate\u201d the use of personal identity verification (PIV) cards and other forms of multifactor identification.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3377431\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So, in the wake of the OMB hack, the federal CIO (Tony Scott) has directed government agencies to get serious about cyber security. The &ldquo;30-day sprint,&rdquo; directs agencies to patch all known vulnerabilities; use information provided by Homeland Security to identify and mitigate known threats; limit the number of privileged users and tighten access controls; and &ldquo;dramatically accelerate&rdquo; the use of personal identity verification (PIV) cards and other forms of multifactor identification.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3377431\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-16120","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=16120"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16120\/revisions"}],"predecessor-version":[{"id":16121,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16120\/revisions\/16121"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=16120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=16120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=16120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}