SlideShare une entreprise Scribd logo
1  sur  85
Tech Update Summary
June 2016
Blue Mountain Data Systems
For CTOs, CIOs & CISOs
Visit Blue Mountain Data Systems
https://www.bluemt.com
For CTOs, CIOs & CISOs
Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue
Mountain Data Systems Blog. We hope you will visit our blog for the latest information.
You can also receive these updates via email. Click here to subscribe.
Here’s the summary of the Daily Tech Updates for June 2016. Hope the information and ideas prove
useful.
Best,
Paul Vesely
President and Principal Architect
Blue Mountain Data Systems Inc.
Network Security
Network Security
SWIFT: Launches Plan to Brace Network’s Security. SWIFT is stepping up efforts to
share information among global financial institutions and develop security audit
frameworks for customers. The Society for Worldwide Interbank Financial
Telecommunication has unveiled a five-point plan to reinforce the security of
SWIFT’s payments system in the wake of the Bangladesh Bank heist. Read more
[CFO.COM]
SECURITY SUCCESS: 5 Secret Habits Of Highly Successful Network Security
Programs. The key ingredients to network cybersecurity success and how they
improve security results. A new report shows that when IT organizations are
segmented by security success factors, the top performers share a number of
network security best practices. Read the rest
[DARKREADING.COM]
Network Security
INDUSTRY INSIGHT: Next-gen Networks Call for Strategic Security. Government
networks face an environment of escalating risk from cyberattacks, a painful reality
in the digital world. Protecting sensitive government and constituent information is
unquestionably the most serious challenge agencies face. Modernizing networks is
one way agencies can address these challenges, but they must be skeptical when
evaluating new networking solutions — particularly when it comes to their security
capabilities. Adoption of managed broadband, together with security
improvements to existing legacy technologies, offers a hybrid approach to network
modernization that is cost-effective and delivers results. Find out more
[GCN.COM]
Network Security
ARMY: Tests Upgraded NetOps Toolset for WIN-T Network Security. The U.S. Army
has demonstrated an updated tactical network operations toolset as part of the
Warfighter Information Network-Tactical Increment 3 limited user test during the
Network Integration Evaluation 16.2 event at Fort Bliss, Texas. Read more
[EXECUTIVEGOV.COM]
Encryption
Encyption
MOBILE: 7 Reasons Mobile Payments Still Aren’t Mainstream. Though mobile
payments and wallets are increasingly popular, they’re still nowhere near
mainstream. A set of experts and finance-industry watchers weigh in on what’s
holding mobile payments back, as well what will need to happen for the systems to
hit the big time. Read more
[CIO.COM]
ANDROID: Android Patch: Samsung Fixes Galaxy Flaw That Lets Crooks into Stolen
Phones. Samsung has issued a patch to shut down a bypass for ‘factory reset
protection’, which is meant to stop thieves from setting up a stolen device. Find
out more
[ZDNET.COM]
Encyption
GOVERNMENT AGENCIES: Protecting Data Means Balancing Security vs.
Convenience. Most people use encryption every day, unaware that their phones
and Internet browsers invisibly translate their data as it moves from point to point
on the internet or that their mobile apps use the technology to obscure their data
in the cloud. Yet many government agencies are still struggling to deploy
encryption across all their systems.Only 44 percent of non-defense Federal web
sites employ the secure HTTPS Internet protocol, according to pulse.cio.gov, a
government transparency project of the General Services Administration (GSA).
Read the rest
[GOVTECHWORKS.COM]
Encyption
CLOUD: Microsegmentation & The Need For An Intelligent Attack Surface. There is
a fundamental difference in the security posture and technology for protecting the
White House versus a Social Security office in California. So, too, for the critical
apps and systems that are likely targets in your enterprise. Read more
[DARKREADING.COM]
Databases
Databases
BIG DATA: Why Some of the Fastest Growing Databases Are Also the Most
Experimental. Everyone has heard about MongoDB and Cassandra, but what other
databases are making big gains against Oracle and Microsoft? Read more
[TECHREPUBLIC.COM]
GOOGLE: Rolls Out New Features for BigQuery. As the internet giant looks to
bolster its enterprise business, it’s making its data analysis service more
compatible with traditional big data workflows. Read the rest
[ZDNET.COM]
Databases
MICROSOFT: Review – SQL Server 2016 Boosts Speed, Analytics. SQL Server 2016
shines with stretch database to Azure, queries against Hadoop, internal R, better
security, and higher performance. Find out more
[INFOWORLD.COM]
MYSQL: Using MySQL 5.7 Document Store With IoT. MySQL 5.7 includes a
document store designed for storing JSON documents and querying against them
without pre-defining the document structure. Read more
[DZONE.COM]
More About Blue Mountain
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S.
Dept. of Labor, Employee Benefits Security Administration. Responsible to the
Office of Technology and Information Systems for information systems
architecture, planning, applications development, networking, administration and
IT security, supporting the enforcement of Title I of the Employee Retirement
Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for
design, development and support for its various enforcement database
management systems, as well as all case tracking and customer service inquiry
systems. Blue Mountain also provides IT security services to the EBSA, in the form
of FISMA Assessment and Authorization, System Security Plans, Risk and
vulnerability assessments, monitoring and investigation support. Read more.
Security Patches
Security Patches
GOOGLE: Android Security: Google’s June Update Splats Dozens of Critical, High-
Severity Bugs. Google rolls out the June security update for Nexus and Android —
but will your device be among those getting the fixes? Read more
[ZDNET.COM]
NETWORKS: NTP Patches Flaws That Enable DDoS. The network time protocol, at
the center of a number of high-profile DDoS attacks in 2014, was updated last
Thursday to ntp-4.2.8p8. The latest version includes patches for five vulnerabilities,
including one rated high-severity. NTP, specifically the NTP daemon, synchronizes
system clocks with time servers. Read more
[THREATPOST.COM]
Security Patches
JENKINS: Jenkins Security Patches Could Break Plug-Ins. The latest security
update for Jenkins changed how build parameters are handled, impacting
multiple plug-ins. The latest version changes how plug-ins use build parameters,
though, so developers will need to adapt to the new process. The vulnerabilities
affect all previous releases, including the mainline releases up to and including
2.2, and LTS releases up to and including 1.651.1. Administrators should update
their Jenkins installations to mainline release Jenkins 2.3 or LTS 1.651.2. Read the
rest
[INFOWORLD.COM]
Security Patches
SYMANTEC & CISCO: Symantec Security Flaw and Cisco Web Security Patches –
Security News IT Leaders Need to Know. A Google Project Zero researcher has
discovered several remote code execution vulnerabilities in Symantec anti-
malware software, the most serious of which was a flaw in the core scanning
engine that required no user interaction for exploitation. CERT reports that Cisco
has released fixes for four flaws in its web security appliance, any of which could
allow a remote attacker to cause denial of service. Find out more
[BUSINESS.FINANCIALPOST.COM]
Incident Response
Incident Response
SECURITY: The Five Ws (and One H) of Effective Incident Response. Good incident
response always starts with answering six key questions. Read more
[INFORMATION-AGE.COM]
FEDERAL RESERVE: House Committee Investigates Federal Reserve Cyber-Attacks. A
Reuters report into cybersecurity at the Federal Reserve triggers a House
committee investigation into the Federal Reserve’s security protections. Read the
rest
[PCMAG.COM]
Incident Response
ENTERPRISES: Enterprises Are Investing in Network Security Analytics. Dangerous
threats and new requirements persuading organizations to collect, process, and
analyze more and more network telemetry and threat intelligence. Find out more
[NETWORKWORLD.COM]
RANSOMWARE: Beware the Rise of Ransomware. The use of ransomware is on the
rise. Hackers and bad actors ranging from independent amateurs to sophisticated,
organized cartels are using the latest malware techniques, strong encryption and
secure online payment systems to extort millions of dollars from people and
organizations who just want their data back. These attacks are hitting organizations
in every sector, and the federal government is by no means immune. Read more
[FEDERALTIMES.COM]
Program Management
Program Management
MICROSOFT: Microsoft Launches Planner, a Project-Management Tool Part of
Office 365. Microsoft has launched Office 365 Planner, a new project-
management tool for teams. The company will be rolling out Planner worldwide
to Office 365 users, including Office 365 Enterprise E1–E5, Business Essentials,
Premium, and Education subscription plans. The Planner tile will appear in your
Office 365 app launcher, meaning Office 365 admins don’t need to take any
action. Read more
[VENTUREBEAT.COM]
Program Management
NASA: When Project Management Really is Rocket Science: A Lesson from NASA.
A recent GAO assessment of major NASA projects shows that 18 of the
organization’s biggest projects received very positive reviews – with project
management receiving credit for some of that success. What has proven to be
extremely effective for NASA is utilizing standards and adapting tools and
processes to the needs of the agency, while satisfying considerations of such
leading practices as EVM, project costing, baseline establishment and blending
of engineering disciplines into projects. Read the rest
[FEDERALTIMES.COM]
Program Management
ADVICE: 6 Ways to Be a Better Project Manager. Project management is a
complex — and critical — function. Here are six pieces of advice to help project
managers improve their craft. Find out more
[CIO.COM]
IT CAREERS: What’s Going On with IT Hiring? Analysts have been generally
cautious this year about IT hiring trends. Although the unemployment rate for IT
professionals is about half the national average of 4.7%, said CompTIA, some
analysts use terms ranging from “modest” to “pre-recession” to describe IT
hiring. Read more
[COMPUTERWORLD.COM]
For the CIO, CTO & CISO
For the CIO, CTO & CISO
CIO: AstraZeneca CIO Dave Smoley’s 6-Point Cloud Toolkit. Early adopter of
enterprise cloud applications AstraZeneca CIO Dave Smoley passes on lessons
learned. Here’s a 6-point cloud adoption toolkit. Read more
[DIGINOMICA.COM]
CTO: Culture Change Critical as Agencies Try to Innovate. Several federal IT execs at
the Federal Innovation Summit touted unique programs their agencies are
spearheading – including a virtual reality program for a USDA office’s training team.
Read the rest
[FEDSCOOP.COM]
For the CIO, CTO & CISO
CISO: How to Survive in the CISO Hot-Seat. The CISO is a precarious job. Research
studies indicate that CISOs typically survive just 18 months to two years in a job
which is increasingly complex and multi-skilled. How can you be successful in a post
where security incidents and management feuds can result in losing your job? Find
out more
[CSOONLINE.COM]
IoT: VMware CIO Commands IoT Effort. The software company releases to open
source an SDK intended to let developers build Internet of Things applications that
run on any network device, OS or infrastructure. Read more
[CIO.COM]
Application Development
Application Development
STRATEGY: Choosing Your Application Development Strategy. Which is more
effective: the top-down or bottom-up application strategy? Discover why choosing
one requires an in-depth understanding of application requirements. Read the rest
[SEARCHSOA.TECHTARGET.COM]
CLOUD: Why Amazon and OpenStack Continue to Thrive in a Complex Cloud World.
Amazon announcing AWS hitting a $10B annual run rate and OpenStack’s 13th
release—lead some to wonder who is winning. Both are. Read more
[EWEEK.COM]
Application Development
MICROSOFT: Power BI Hits 5M Subscribers, Adds Deeper Excel Integration.
Microsoft has a ton of new features planned for its cloud-based BI service.
Microsoft’s cloud-based business intelligence service is celebrating a major user
growth milestone with a handful of new features, including the ability to import
data from an Excel spreadsheet and turn it into live-updating charts and graphs.
Power BI now has more than 5 million subscribers, who are using the service to
take in business data and create dashboards they can use to better understand
their businesses. Subscribers will be able to use an Excel connector to easily “pin”
live-updating data from the Excel desktop app to a Power BI dashboard. Both that
feature, and one that allows users to analyze data from Power BI in Excel, were
previously available for beta testing and are now generally available. Read more
[PCWORLD.COM]
Application Development
NODE.js: Top Reasons to Use Node.js for Web Application Development. There are
many reasons why developers (regardless of experience level) should use Node.js
for web application development, starting with its speed and ending with its
proficiency at multi-user, real-time web applications. Not to mention that three
years ago Nodejitsu reached out to the npm community for help running the public
npm servers and raised over $300,000 for the project, proving that the community
is both active and generous. Read more
[JAXENTER.COM]
BYOD
BYOD
MOBILE SECURITY: BYOD Can Pose Privacy Risks to Employees. Companies using
MDM to oversee employee devices are collecting more information than employees
realize. Read more
[CSOONLINE.COM]
EDUCATION: What Are the Best BYOD Tools for Presentation, Collaboration and
More? Besides simply having technology in the classroom through BYOD programs or
others, schools are increasingly being pushed to use it well and limit the “digital use”
gap that exists between students from low-income families and their wealthier
peers. Active tech use, while challenging, is critical for the next phase of K-12
education technology. Read the rest
[EDUCATIONDIVE.COM]
BYOD
ENTERPRISE: Dude, Where’s My Phone? BYOD Means Enterprise Security Exposure.
You should be worried, very worried, if an employee loses a smartphone or tablet—
especially if that employee accesses any enterprise resources using that device. Find
out more
[NETWORKWORLD.COM]
OPINION: BYOD? More Like “Bring Your Own Divide”. There is no way around it: the
modern workforce is mobile and relies on CXOs to deliver enterprise security in the
clearest way possible – no matter where they find themselves. CXOs need to
embrace their businesses operational models and define strategies to secure critical
data. Read more
[INFOSECURITY-MAGAZINE.COM]
Big Data
Big Data
TECH: Building Your Big Data Infrastructure: 4 Key Components Every Business
Needs To Consider. Big data can bring huge benefits to businesses of all sizes.
However, as with any business project, proper preparation and planning is essential,
especially when it comes to infrastructure. Until recently it was hard for companies
to get into big data without making heavy infrastructure investments (expensive
data warehouses, software, analytics staff, etc.). But times have changed. Cloud
computing in particular has opened up a lot of options for using big data, as it
means businesses can tap into big data without having to invest in massive on-site
storage and data processing facilities. Read more
[FORBES.COM]
Big Data
TERROR: Now Can Big Data Fight Terror? Why don’t officials know when an Omar
Mateen buys a mass-murder weapon? What are we getting from government
investment in big data? Read the rest
[WSJ.COM]
SECURITY: Big Data Will Fix Internet Security…Eventually. Security analytics have
been with us for a while, but with the latest tech, it’s much easier to detect
malicious attacks. Find out more
[INFOWORLD.COM]
PRIVACY: iPhone, AI and Big Data: Here’s How Apple Plans to Protect Your Privacy.
Can Apple take the ‘big brother’ out of big data? Read more
[ZDNET.COM]
Mobile Applications
Mobile Applications
STUDY ON USAGE: Nearly 1 in 4 People Abandon Mobile Apps After Only One Use.
Apple’s iTunes App Store is home to over 1.5 million apps and Google Play hosts
over 2 million, but the number of apps that actually get installed and used on
consumers’ devices is still quite small. We already knew that people only interacted
with a small handful of third-party apps on a regular basis, and now, according to a
new study on mobile app usage, we learn that about one in four mobile users only
use an app once. Read the rest
[TECHCRUNCH.COM]
Mobile Applications
DEVOPS: Mobile App Development – 8 Best Practices. Creating great mobile
enterprise apps isn’t necessarily easy, but it can be easier if you follow these eight
critical tips.
Find out more
[INFORMATIONWEEK.COM]
RED HAT: Takes Application Development to the Bank. The open source
juggernaut’s remarkably steady growth depends less on Linux every year.
Read more
[INFOWORLD.COM]
Mobile Applications
CONSUMER TECHNOLOGY: Facebook, Google Dominate List of Top 15 Mobile Apps.
Tech behemoths Facebook and Google own more than half of the 15 most popular
mobile applications used by U.S. adults — the reach of other well-liked apps such as
Snapchat and Apple Maps doesn’t even compare. Read more
[CIO.COM]
Personnel Management
Personnel Management
WORKFORCE: Millennials Want to Stay, If Government Grasps the New Reality. Many
“millennials” in government say their agencies haven’t yet understood what makes
them tick. And their generation isn’t drastically different than the ones that have
come before it. Though a majority of federal employees under the age of 35
indicated their interest in staying within the federal government, many millennials
said their decision depends on several different factors. Read the rest
[FEDERALNEWSRADIO.COM]
OPM: Office of Personnel Management Hires First CISO. Following one of the largest
data breaches on record, the Office of Personnel Management hires a chief
information security officer. The new CISO is Cord Chase, former senior adviser on
Cyber and National Security to the White House and Office of Management and
Budget, and technology head and engineer at the U.S. Department of Agriculture.
Find out more [GOVTECH.COM]
Personnel Management
DOD: The 4 Big Takeaways from Ash Carter’s New Push for Military Personnel
Reform. The plan to overhaul the military personnel system that Defense Secretary
Ash Carter announced Thursday would end the “one-size-fits-all” promotion system
for military officers and clear the way for far more diverse options in military career
tracks. Read more
[MILITARYTIMES.COM]
FEDERAL CIVIL SERVICE: Report Says Top Civil-Service Rank Needs Urgent Boost. The
Senior Executive Service, the highest rank of the nation’s federal civil service, carries
a certain prestige. But that is not enough to convince many lower-ranking employees
that the status is worth the headache. Read more
[WASHINGTONPOST.COM]
Programming & Scripting Development
Client & Server-Side
Programming & Scripting Development
Client & Server-Side
JAVASCRIPT: F# Functional Programming Comes to JavaScript. The Fable compiler
gives developers the opportunity to unite the realms of F# functional programming
and JavaScript. In a beta stage of development, Fable leverages F# and uses Babel
compilers to generate source maps. A 1.0 release is due soon. Read more
[INFOWORLD.COM]
JAVA: Google Wins Java Copyright Case Against Oracle. Federal jury finds Google’s
use of Java software was “fair use”. A federal jury found Google’s use of Oracle
Corp.’s Java software in its mobile products didn’t violate copyright law, a verdict
cheered by many in Silicon Valley who believe it will protect how they write and
use software. The decision, which Oracle said it would appeal, marked the latest
chapter in a six-year legal battle in which Oracle sought as much as $9 billion from
Google for using 11,000 lines of Java software code in its Android software.
Read the rest [WSJ.COM]
Programming & Scripting Development
Client & Server-Side
C#: Mads Torgersen and Dustin Campbell on the future of C#. How has open source
changed it – and can it survive Windows PC decline? This is a moment of change
for Microsoft’s development tools, as the company transitions from focusing
entirely on Windows, to creating cross-platform tools that it hopes will push
developers towards its Azure cloud services, either as a back-end for mobile
applications, or as a deployment platform for server applications irrespective of
the operating system. Find out more
[THEREGISTER.CO.UK]
Programming & Scripting Development
Client & Server-Side
HTML5: HTML5 by Default: Google’s Plan to Make Chrome’s Flash Click-to-Play. Top
10 sites will be whitelisted, everything else will default to HTML5. Google will be
taking another step towards an HTML5-only Web later this year, as the systematic
deprecation and removal of Flash continues. In a plan outlined last month, Flash
will be disabled by default in the fourth quarter of this year. Embedded Flash
content will not run, and JavaScript attempts to detect the plugin will not find it.
Whenever Chrome detects that a site is trying to use the plugin, it will ask the user
if they want to enable it or not. It will also trap attempts to redirect users to
Adobe’s Flash download page and similarly offer to enable the plugin. Read more
[ARSTECHNICA.COM]
Programming & Scripting Development
Client & Server-Side
JAVA: Java’s Spring Framework Gets a New Competitor. Datamill, an open source
framework that leverages Java 8 and lambdas, is bringing functional programming
to Java-based web development. Read more
[INFOWORLD.COM]
JAVASCRIPT: New Ransomware Strain Coded Entirely in Javascript. Security
researchers have discovered a new strain of ransomware coded entirely in
Javascript, which could increase its chances of being activated. Read the rest
[BBC.COM]
Programming & Scripting Development
Client & Server-Side
HTML5: W3C’s Rejected HTML5 Proposal Imperils Security Researchers. The World
Wide Web Consortium (W3C) is embroiled in an ongoing dispute over digital rights
management for HTML5. In the latest development of the dispute, W3C digital
rights management (DRM) working group chairman Paul Cotton vetoed a proposal
to discuss HTML5 standards before renewing the group’s charter. Find out more
[SCMAGAZINE.COM]
PROGRAMMING: The 9 Most In-Demand Programming Languages to Learn. With
the help of this list from Codingdojo, here are the nine most in-demand coding
languages that you should learn, no matter what profession you’re in. Read more
[TECH.CO]
Cloud Computing
Cloud Computing
CLOUD EXPO: Conference Short On Innovation, Still Provides Value. Jason Bloomberg
has attended Sys-Con’s Cloud Expo conference several times both in New York and
Silicon Valley over the last few years, but last week’s installment at Manhattan’s Javits
Convention Center seemed a mere shell of its former self. Why the drop-off this
year? Read more
[FORBES.COM]
STORAGE WARS: How the Federal Government is Tackling Data Growth. With more
devices collecting data, agencies find themselves with larger amounts of data than
ever before. To manage that growth, and avoid letting it overwhelm them, federal IT
leaders leverage storage solutions that can securely host large volumes of data
without overburdening the budget. Find out more
[FEDTECHMAGAZINE.COM]
Cloud Computing
AWS: Cloud Computing Ops, Data Centers, 1.3 Million Servers Creating Efficiency
Flywheel. Oppenheimer is betting that Amazon shares can get to $930. The primary
reason: AWS is a profit machine that’ll deliver 2023 revenue topping $57 billion. In a
nutshell, Oppenheimer concludes that AWS’ capital spending won’t need to be as
high as expected. Why? “AWS’ competitive advantages in procuring, designing and
architecting datacenters and compute/storage resources are driving even higher
profitability and lower capital intensity than previously expected.” Read the rest
[ZDNET.COM]
Cloud Computing
FEDERAL CIOs: Need Help with Legacy-to-Cloud Transition. Government IT leaders
stress value in private-sector partnerships, repeatable contracting provisions as they
look to incremental modernization strategies. “Modernization” was one of the
watchwords in President Obama’s proposal for the federal IT budget in fiscal 2017,
and while that broad effort might sound anything but controversial, updating legacy
systems entails a host of challenges that agency CIOs are only beginning to work
through. Read more
[CIO.COM]
Cloud Computing
GOOGLE: Google Reportedly Looking to Commercialize Its Spanner Database. The
company wants to see if it can use its massive database technology to compete
better with Amazon Web Services and Microsoft Azure. One of the biggest obstacles
facing the company as it embarks on its mission is finding a way to decouple
Spanner from Google’s proprietary hardware and network technology and building a
version that will work just as well on other infrastructures. Read the rest
[EWEEK.COM]
BREXIT: Brexit Spells Turbulence for Cloud Computing: 6 Stormy Scenarios. The
fallout from the U.K. leaving the EU is just starting. Here’s a look at how large cloud
computing vendors may be affected. Get ready for the pause in U.K. data center
build-outs. Find out more
[ZDNET.COM]
Cloud Computing
AMAZON: Gets High-Level U.S. Government Clearance For Cloud Computing.
Amazon has received high-level authorization for its Amazon Web Services, opening
the door for U.S. government agencies to store highly sensitive but unclassified data
on its cloud computing platform. The authorization is known as the Federal Risk and
Authorization Management Program (FedRAMP) high baseline, a standard set of
security requirements for cloud services. It covers more than 400 security controls
and gives U.S. government agencies the ability to leverage AWS for highly sensitive
workloads, including patient records, financial data, law enforcement data and other
controlled-but-unclassified information. Read more
[INVESTORS.COM]
Cloud Computing
SAMSUNG: Snaps Up Joyent, the Best-Kept Secret in Cloud Computing. One of the
best-kept secrets in cloud computing has just found a new home. Samsung
Electronics announced Wednesday that it will acquire Joyent, a vital but lesser-
known player the cloud hosting market – and one with quite a history behind it.
Read more
[WIRED.COM]
Business Intelligence
Business Intelligence
OPEN SOURCE: Top 7 Open Source Business Intelligence and Reporting Tools. In
economies where the role of big data and open data are ever-increasing, where
do you turn in order to have data analysed and presented in a precise and
readable format? Here’s a list of top open source business intelligence (BI) and
reporting tools that can help. Read the rest
[OPENSOURCE.COM]
HADOOP: Hadoop Public Cloud Service. BlueData of Santa Clara, California
specializes in enabling big data-as-a-service, letting organizations spin up virtual
Hadoop or Spark clusters and providing on-demand access to applications, data,
and infrastructure to data scientists and data analysts. This week BlueData
announced that the enterprise edition of its BlueData EPIC software will run on
Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, and other
public cloud services. Find out more
[INFORMATIONWEEK.COM]
Business Intelligence
NoSQL: Database Technology Finds Use Cases, But Still Minority Sport. From
managing water meter data, through Bitcoin and video data, to web publishing,
NoSQL database technology is finding real use cases. But it’s likely to be stuck at 10%
of the market for some time. Read more
[COMPUTERWEEKLY.COM]
DATA: Techniques for Moving Computation to Where the Data Lives. Building in-
memory data structure stores helps achieve operational intelligence. Read more
[DZONE.COM]
IT Security | Cybersecurity
IT Security | Cybersecurity
STATE CIOS: State CIOs Struggle with Cybersecurity, Cloud Computing Amid Rampant
Workforce Changes. For the U.S. to effectively digitize their infrastructure, the
National Association of State CIOs said a stable and talented workforce is needed.
Doug Robinson, NASCIO executive director, pinpointed cybersecurity, evolving
service delivery models, workforce renewal, and the prevalence of data as the key
challenges facing governments. Robinson also put forth measures to address them.
Read more
[HEALTHCAREITNEWS.COM]
IT Security | Cybersecurity
WHY: Car-Hacking Could Threaten the Federal Government. The latest Government
Accountability Office vehicle cybersecurity report found that modern cars, especially
those made in 2015 or later, are highly susceptible to hacking that could allow for
the remote takeover of the vehicle. The problem, according to the report, is that
new systems and features, some of them for safety and some for comfort, are
constantly being added to new models. Given that the federal government is the
owner of one of the largest fleets of vehicles in the world, the cybersecurity health
of such a valuable asset pool should probably be a priority. Read the rest
[NEXTGOV.COM]
IT Security | Cybersecurity
FEDERAL BUDGETS: Cybersecurity Goals to Guide Federal Software Spending. The
U.S. government is on track to significantly boost spending on cybersecurity
solutions. However, evolving requirements to greatly improve federal protection of
information technology resources will shape that spending. In fact, federal
cyberprotection goals should be augmented and significantly modified, according to
recent studies of the federal market. The linkage between increased federal
investing in cybersecurity and the requirements for bolstering IT protection are
portrayed in two newly released reports. Find out more
[ECOMMERCETIMES.COM]
IT Security | Cybersecurity
CISO: Leading By Example: the Federal CISO and Cybersecurity Collaboration. In
2015, there were 781 known data breaches in the United States, according to the
Identity Theft Resource Center, exposing a staggering 169 million records. Records
described as government/military accounted for 20.2 percent of those that were
exposed via data breach, while healthcare accounted for 66.7 percent of
compromised records. And given that many organizations do not report data
breaches for fear of damaging their reputations, we know the true numbers are
significantly higher. The new federal CISO will have their work cut out for them. We,
as a nation, seem to be fighting a losing battle. Yet, with every challenge comes
opportunity to disrupt the status quo. As the new CISO enters the volatile
cybersecurity landscape, there are multiple areas in which he or she can have an
impact through industry collaborations offering new technologies and innovations.
Read more
[FCW.COM]
IT Security | Cybersecurity
PATCHES: Microsoft Acknowledges Permission Problems with MS16-072 Patches.
The patches all aimed at fixing Group Policy, but in the end they break Group Policy.
Problems are being reported with the MS16-072/KB 3163622 patch. Admins are
saying it breaks some Group Policy settings: drives appear on domain systems that
should be hidden, mapping drives don’t work, and other typical GPO settings aren’t
getting applied. Read more
[INFOWORLD.COM]
IT Security | Cybersecurity
DOD: Bug Bounty Hunters Discover Over 100 Security Flaws During DOD Contest.
Participants in the first-ever “Hack the Pentagon” bug bounty contest found more
than 100 vulnerabilities in the Defense Department’s computer systems. The
program, the first-ever of its kind offered by the federal government, invited hackers
to test the cybersecurity of some public U.S. Department of Defense websites. A
total of 1,400 certified hackers participated in the contest. Read the rest
[CIODIVE.COM]
FEDERAL: Federal Cybersecurity Boondoggle: The Software Assurance Marketplace
(SWAMP). Well-intended DHS program suffers from a lack of relevant features,
internal mismanagement, and few actual users. Find out more
[NETWORKWORLD.COM]
IT Security | Cybersecurity
INDUSTRY INSIGHT: Extending Cybersecurity to Fraud Analytics. Information
security leaders often defend against cyber threats by focusing on traditional IT tools
and techniques — firewalls, intrusion detection and prevention systems, malware
detection and analysis and the like. As organizations have locked down systems with
more sophisticated defense-in-depth technical controls, adversaries have evolved to
take advantage of information systems by impersonating regular users. While there
are some similarities between cybersecurity and fraud, traditional cybersecurity
monitoring and analytics must evolve in order to identify the fraudulent use of IT
systems that may otherwise go unnoticed. Read more
[GCN.COM]
From the Blue Mountain Data Systems Blog
Three-Dimensional Governance for the CIO
https://www.bluemt.com/three-dimensional-governance-for-the-cio
7 Reasons to Take Control of IT Incidents
https://www.bluemt.com/7-reasons-to-take-control-of-it-incidents/
Breach Mitigation Response Time Too Long, Survey Says
https://www.bluemt.com/breach-mitigation-response-time-too-long-survey-
says/
Six Tactics for Cyberdefense
https://www.bluemt.com/six-tactics-for-cyberdefense/
From the Blue Mountain Data Systems Blog
Feds Report Mixed Responses to Shared Services
https://www.bluemt.com/feds-report-mixed-responses-to-shared-services
Federal Employees Are Not Security Experts
https://www.bluemt.com/federal-employees-are-not-security-experts
Survival Guide for Network Administrators
https://www.bluemt.com/survival-guide-for-network-administrators
DBaaS: OpenStack Trove Changes DB Management
https://www.bluemt.com/dbaas-openstack-trove-changes-db-management
From the Blue Mountain Data Systems Blog
Help Wanted: Certified Cybersecurity Professionals
https://www.bluemt.com/help-wanted-certified-cybersecurity-professionals
Cyber Threat Intelligence Integration Center Preview
https://www.bluemt.com/cyber-threat-intelligence-integration-center-preview/
Cloud Moves in 1-2-3
https://www.bluemt.com/cloud-moves-in-1-2-3/
Change Management for Disaster Recovery
https://www.bluemt.com/change-management-for-disaster-recovery/
From the Blue Mountain Data Systems Blog
Jeffersonian Advice For C-Suite Career Advancement
https://www.bluemt.com/jeffersonian-advice-for-c-suite-career-advancement/
Ways To Survive The “Mobile-Pocalypse”
https://www.bluemt.com/ways-to-survive-the-mobile-pocalypse/
Microsoft Cloud Services Receive FedRAMP Authority to Operate
https://www.bluemt.com/microsoft-cloud-services-receive-fedramp-authority-
to-operate/
Hiring Pentesters? Here Are 10 Things You Need to Know
https://www.bluemt.com/hiring-pentesters-here-are-10-things-you-need-to-
know/
From the Blue Mountain Data Systems Blog
Home Router Malware Alert
https://www.bluemt.com/home-router-malware-alert/
Threat Model Deconstruction
https://www.bluemt.com/threat-model-deconstruction/
Business Email Scam Nets $214 Million
https://www.bluemt.com/business-email-scam-nets-214-million/
How to Prevent Unauthorized Software from Taking Over Your Organization
https://www.bluemt.com/the-cios-guide-to-happy-end-users-2/
From the Blue Mountain Data Systems Blog
Digital Marketing Predictions for 2015
https://www.bluemt.com/digital-marketing-predictions-for-2015/
SDN: Network Administrator’s Friend or Foe?
https://www.bluemt.com/sdn-network-administrators-friend-or-foe/
Mobile Payments: A Must for Federal Agencies
https://www.bluemt.com/mobile-payments-a-must-for-federal-agencies/
Soft Skills Are A Must-Have For Careers In IT
https://www.bluemt.com/soft-skills-are-a-must-have-for-careers-in-it/
From the Blue Mountain Data Systems Blog
Security Risks Most Prevalent in Younger Workers
https://www.bluemt.com/security-risks-most-prevalent-in-younger-workers/
The Security World’s Maturation
https://www.bluemt.com/the-security-worlds-maturation/
Data Breach Concerns Keep CISOs Up At Night
https://www.bluemt.com/data-breach-concerns-keep-cisos-up-at-night/
Personalized Govt Equals Instant Gratification for Citizens
https://www.bluemt.com/personalized-govt-equals-instant-gratification-for-
citizens/
From the Blue Mountain Data Systems Blog
People-Centric Security
https://www.bluemt.com/people-centric-security/
Pentagon Tries BYOD To Strike Work/Life Balance
https://www.bluemt.com/pentagon-tries-byod-to-strike-worklife-balance/
Open Source Model Considered for MS Windows
https://www.bluemt.com/open-source-model-considered-for-ms-windows/
Open Internet: To Be or Not to Be?
https://www.bluemt.com/open-internet-to-be-or-not-to-be/
From the Blue Mountain Data Systems Blog
Malware Stays A Step Ahead Infecting One Third of Websites
https://www.bluemt.com/malware-stays-a-step-ahead-infecting-one-third-of-
websites/
Machine-Generated Data: Potential Goldmine for the CIO
https://www.bluemt.com/machine-generated-data-potential-goldmine-for-the-
cio/
Government Legacy Programs: Reuse vs. Replacement
https://www.bluemt.com/government-legacy-programs-reuse-vs-replacement/
It Takes a Whole Village to Protect Networks and Systems
https://www.bluemt.com/it-takes-a-whole-village-to-protect-networks-and-
systems/
From the Blue Mountain Data Systems Blog
Governance For the CIO
https://www.bluemt.com/governance-for-the-cio/
Help Desk Consolidation – Lessons Learned
https://www.bluemt.com/help-desk-consolidation-lessons-learned/
One Year Later, Companies Still Vulnerable to Heartbleed
https://www.bluemt.com/one-year-later-companies-still-vulnerable-to-
heartbleed/
Federal Projects Cultivate Worker Passion
https://www.bluemt.com/federal-projects-cultivate-worker-passion-2/
ABOUT US
Blue Mountain Data Systems Inc.
Blue Mountain Data Systems Inc. is dedicated to application
and systems development, electronic document management,
IT security support, and the automation of workflow processes.
Read more about our experience here:
>> http://bluemt.com/experience
Recent Experience
U.S. Dept. of Labor
Employee Benefits Security Administration
1994 to Present
Responsible to the Office of Technology and Information Systems for information
systems architecture, planning, applications development, networking,
administration and IT security, supporting the enforcement of Title I of the
Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue
Mountain is responsible for design, development and support for its various
enforcement database management systems, as well as all case tracking and
customer service inquiry systems. Blue Mountain also provides IT security services
to the EBSA, in the form of FISMA Assessment and Authorization, System Security
Plans, Risk and vulnerability assessments, monitoring and investigation support.
MANAGEMENT
Paul T. Vesely
Founder, President, CEO and Principal Architect
Mr. Vesely is a recognized thought leader in systems
architecture and delivery, having designed and
delivered many enterprise wide information and
document management solutions. Mr. Vesely’s history
includes 33 years experience in the information
systems industry, with Unisys, Grumman, PRC and a
host of clients in both government and private sectors.
CONTACT US
Contact Us Today to Discuss Your Next IT Project
HEADQUARTERS
366 Victory Drive
Herndon, VA 20170
PHONE 703-502-3416
FAX 703-745-9110
EMAIL
paul@bluemt.com
WEB
https://www.bluemt.com

Contenu connexe

En vedette

ENGAGE what does the fox say
ENGAGE what does the fox sayENGAGE what does the fox say
ENGAGE what does the fox sayAlexandra Okada
 
【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ
【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ
【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループAPCommunications-recruit
 
Accompagnement des collectivités locales à l’ouverture des données publiques ...
Accompagnement des collectivités locales à l’ouverture des données publiques ...Accompagnement des collectivités locales à l’ouverture des données publiques ...
Accompagnement des collectivités locales à l’ouverture des données publiques ...Les Interconnectés
 
Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016
Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016
Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016Les Interconnectés
 
Programme de développement concerté de l'Administration Numérique Territorial...
Programme de développement concerté de l'Administration Numérique Territorial...Programme de développement concerté de l'Administration Numérique Territorial...
Programme de développement concerté de l'Administration Numérique Territorial...Les Interconnectés
 

En vedette (8)

ENGAGE invasion
ENGAGE invasionENGAGE invasion
ENGAGE invasion
 
ENGAGE ebola
ENGAGE ebolaENGAGE ebola
ENGAGE ebola
 
ENGAGE what does the fox say
ENGAGE what does the fox sayENGAGE what does the fox say
ENGAGE what does the fox say
 
ENGAGE car wars
ENGAGE car warsENGAGE car wars
ENGAGE car wars
 
【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ
【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ
【自社プロダクト開発エンジニア募集中】エーピーコミュニケーションズ 先進開発グループ
 
Accompagnement des collectivités locales à l’ouverture des données publiques ...
Accompagnement des collectivités locales à l’ouverture des données publiques ...Accompagnement des collectivités locales à l’ouverture des données publiques ...
Accompagnement des collectivités locales à l’ouverture des données publiques ...
 
Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016
Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016
Mon Alfortville l’innovation à 360° - Forum des Interconnectés 2016
 
Programme de développement concerté de l'Administration Numérique Territorial...
Programme de développement concerté de l'Administration Numérique Territorial...Programme de développement concerté de l'Administration Numérique Territorial...
Programme de développement concerté de l'Administration Numérique Territorial...
 

Plus de BMDS3416

Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015BMDS3416
 
Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015BMDS3416
 
Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015BMDS3416
 
10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support Experience10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support ExperienceBMDS3416
 
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your CompetitionBMDS3416
 
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...BMDS3416
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
 

Plus de BMDS3416 (7)

Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015
 
Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015
 
Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015
 
10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support Experience10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support Experience
 
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
 
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 

Dernier

WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 

Dernier (20)

WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 

Tech Update Summary from Blue Mountain Data Systems June 2016

  • 1. Tech Update Summary June 2016 Blue Mountain Data Systems
  • 2.
  • 3. For CTOs, CIOs & CISOs Visit Blue Mountain Data Systems https://www.bluemt.com
  • 4. For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information. You can also receive these updates via email. Click here to subscribe. Here’s the summary of the Daily Tech Updates for June 2016. Hope the information and ideas prove useful. Best, Paul Vesely President and Principal Architect Blue Mountain Data Systems Inc.
  • 6. Network Security SWIFT: Launches Plan to Brace Network’s Security. SWIFT is stepping up efforts to share information among global financial institutions and develop security audit frameworks for customers. The Society for Worldwide Interbank Financial Telecommunication has unveiled a five-point plan to reinforce the security of SWIFT’s payments system in the wake of the Bangladesh Bank heist. Read more [CFO.COM] SECURITY SUCCESS: 5 Secret Habits Of Highly Successful Network Security Programs. The key ingredients to network cybersecurity success and how they improve security results. A new report shows that when IT organizations are segmented by security success factors, the top performers share a number of network security best practices. Read the rest [DARKREADING.COM]
  • 7. Network Security INDUSTRY INSIGHT: Next-gen Networks Call for Strategic Security. Government networks face an environment of escalating risk from cyberattacks, a painful reality in the digital world. Protecting sensitive government and constituent information is unquestionably the most serious challenge agencies face. Modernizing networks is one way agencies can address these challenges, but they must be skeptical when evaluating new networking solutions — particularly when it comes to their security capabilities. Adoption of managed broadband, together with security improvements to existing legacy technologies, offers a hybrid approach to network modernization that is cost-effective and delivers results. Find out more [GCN.COM]
  • 8. Network Security ARMY: Tests Upgraded NetOps Toolset for WIN-T Network Security. The U.S. Army has demonstrated an updated tactical network operations toolset as part of the Warfighter Information Network-Tactical Increment 3 limited user test during the Network Integration Evaluation 16.2 event at Fort Bliss, Texas. Read more [EXECUTIVEGOV.COM]
  • 10. Encyption MOBILE: 7 Reasons Mobile Payments Still Aren’t Mainstream. Though mobile payments and wallets are increasingly popular, they’re still nowhere near mainstream. A set of experts and finance-industry watchers weigh in on what’s holding mobile payments back, as well what will need to happen for the systems to hit the big time. Read more [CIO.COM] ANDROID: Android Patch: Samsung Fixes Galaxy Flaw That Lets Crooks into Stolen Phones. Samsung has issued a patch to shut down a bypass for ‘factory reset protection’, which is meant to stop thieves from setting up a stolen device. Find out more [ZDNET.COM]
  • 11. Encyption GOVERNMENT AGENCIES: Protecting Data Means Balancing Security vs. Convenience. Most people use encryption every day, unaware that their phones and Internet browsers invisibly translate their data as it moves from point to point on the internet or that their mobile apps use the technology to obscure their data in the cloud. Yet many government agencies are still struggling to deploy encryption across all their systems.Only 44 percent of non-defense Federal web sites employ the secure HTTPS Internet protocol, according to pulse.cio.gov, a government transparency project of the General Services Administration (GSA). Read the rest [GOVTECHWORKS.COM]
  • 12. Encyption CLOUD: Microsegmentation & The Need For An Intelligent Attack Surface. There is a fundamental difference in the security posture and technology for protecting the White House versus a Social Security office in California. So, too, for the critical apps and systems that are likely targets in your enterprise. Read more [DARKREADING.COM]
  • 14. Databases BIG DATA: Why Some of the Fastest Growing Databases Are Also the Most Experimental. Everyone has heard about MongoDB and Cassandra, but what other databases are making big gains against Oracle and Microsoft? Read more [TECHREPUBLIC.COM] GOOGLE: Rolls Out New Features for BigQuery. As the internet giant looks to bolster its enterprise business, it’s making its data analysis service more compatible with traditional big data workflows. Read the rest [ZDNET.COM]
  • 15. Databases MICROSOFT: Review – SQL Server 2016 Boosts Speed, Analytics. SQL Server 2016 shines with stretch database to Azure, queries against Hadoop, internal R, better security, and higher performance. Find out more [INFOWORLD.COM] MYSQL: Using MySQL 5.7 Document Store With IoT. MySQL 5.7 includes a document store designed for storing JSON documents and querying against them without pre-defining the document structure. Read more [DZONE.COM]
  • 16. More About Blue Mountain BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
  • 18. Security Patches GOOGLE: Android Security: Google’s June Update Splats Dozens of Critical, High- Severity Bugs. Google rolls out the June security update for Nexus and Android — but will your device be among those getting the fixes? Read more [ZDNET.COM] NETWORKS: NTP Patches Flaws That Enable DDoS. The network time protocol, at the center of a number of high-profile DDoS attacks in 2014, was updated last Thursday to ntp-4.2.8p8. The latest version includes patches for five vulnerabilities, including one rated high-severity. NTP, specifically the NTP daemon, synchronizes system clocks with time servers. Read more [THREATPOST.COM]
  • 19. Security Patches JENKINS: Jenkins Security Patches Could Break Plug-Ins. The latest security update for Jenkins changed how build parameters are handled, impacting multiple plug-ins. The latest version changes how plug-ins use build parameters, though, so developers will need to adapt to the new process. The vulnerabilities affect all previous releases, including the mainline releases up to and including 2.2, and LTS releases up to and including 1.651.1. Administrators should update their Jenkins installations to mainline release Jenkins 2.3 or LTS 1.651.2. Read the rest [INFOWORLD.COM]
  • 20. Security Patches SYMANTEC & CISCO: Symantec Security Flaw and Cisco Web Security Patches – Security News IT Leaders Need to Know. A Google Project Zero researcher has discovered several remote code execution vulnerabilities in Symantec anti- malware software, the most serious of which was a flaw in the core scanning engine that required no user interaction for exploitation. CERT reports that Cisco has released fixes for four flaws in its web security appliance, any of which could allow a remote attacker to cause denial of service. Find out more [BUSINESS.FINANCIALPOST.COM]
  • 22. Incident Response SECURITY: The Five Ws (and One H) of Effective Incident Response. Good incident response always starts with answering six key questions. Read more [INFORMATION-AGE.COM] FEDERAL RESERVE: House Committee Investigates Federal Reserve Cyber-Attacks. A Reuters report into cybersecurity at the Federal Reserve triggers a House committee investigation into the Federal Reserve’s security protections. Read the rest [PCMAG.COM]
  • 23. Incident Response ENTERPRISES: Enterprises Are Investing in Network Security Analytics. Dangerous threats and new requirements persuading organizations to collect, process, and analyze more and more network telemetry and threat intelligence. Find out more [NETWORKWORLD.COM] RANSOMWARE: Beware the Rise of Ransomware. The use of ransomware is on the rise. Hackers and bad actors ranging from independent amateurs to sophisticated, organized cartels are using the latest malware techniques, strong encryption and secure online payment systems to extort millions of dollars from people and organizations who just want their data back. These attacks are hitting organizations in every sector, and the federal government is by no means immune. Read more [FEDERALTIMES.COM]
  • 25. Program Management MICROSOFT: Microsoft Launches Planner, a Project-Management Tool Part of Office 365. Microsoft has launched Office 365 Planner, a new project- management tool for teams. The company will be rolling out Planner worldwide to Office 365 users, including Office 365 Enterprise E1–E5, Business Essentials, Premium, and Education subscription plans. The Planner tile will appear in your Office 365 app launcher, meaning Office 365 admins don’t need to take any action. Read more [VENTUREBEAT.COM]
  • 26. Program Management NASA: When Project Management Really is Rocket Science: A Lesson from NASA. A recent GAO assessment of major NASA projects shows that 18 of the organization’s biggest projects received very positive reviews – with project management receiving credit for some of that success. What has proven to be extremely effective for NASA is utilizing standards and adapting tools and processes to the needs of the agency, while satisfying considerations of such leading practices as EVM, project costing, baseline establishment and blending of engineering disciplines into projects. Read the rest [FEDERALTIMES.COM]
  • 27. Program Management ADVICE: 6 Ways to Be a Better Project Manager. Project management is a complex — and critical — function. Here are six pieces of advice to help project managers improve their craft. Find out more [CIO.COM] IT CAREERS: What’s Going On with IT Hiring? Analysts have been generally cautious this year about IT hiring trends. Although the unemployment rate for IT professionals is about half the national average of 4.7%, said CompTIA, some analysts use terms ranging from “modest” to “pre-recession” to describe IT hiring. Read more [COMPUTERWORLD.COM]
  • 28. For the CIO, CTO & CISO
  • 29. For the CIO, CTO & CISO CIO: AstraZeneca CIO Dave Smoley’s 6-Point Cloud Toolkit. Early adopter of enterprise cloud applications AstraZeneca CIO Dave Smoley passes on lessons learned. Here’s a 6-point cloud adoption toolkit. Read more [DIGINOMICA.COM] CTO: Culture Change Critical as Agencies Try to Innovate. Several federal IT execs at the Federal Innovation Summit touted unique programs their agencies are spearheading – including a virtual reality program for a USDA office’s training team. Read the rest [FEDSCOOP.COM]
  • 30. For the CIO, CTO & CISO CISO: How to Survive in the CISO Hot-Seat. The CISO is a precarious job. Research studies indicate that CISOs typically survive just 18 months to two years in a job which is increasingly complex and multi-skilled. How can you be successful in a post where security incidents and management feuds can result in losing your job? Find out more [CSOONLINE.COM] IoT: VMware CIO Commands IoT Effort. The software company releases to open source an SDK intended to let developers build Internet of Things applications that run on any network device, OS or infrastructure. Read more [CIO.COM]
  • 32. Application Development STRATEGY: Choosing Your Application Development Strategy. Which is more effective: the top-down or bottom-up application strategy? Discover why choosing one requires an in-depth understanding of application requirements. Read the rest [SEARCHSOA.TECHTARGET.COM] CLOUD: Why Amazon and OpenStack Continue to Thrive in a Complex Cloud World. Amazon announcing AWS hitting a $10B annual run rate and OpenStack’s 13th release—lead some to wonder who is winning. Both are. Read more [EWEEK.COM]
  • 33. Application Development MICROSOFT: Power BI Hits 5M Subscribers, Adds Deeper Excel Integration. Microsoft has a ton of new features planned for its cloud-based BI service. Microsoft’s cloud-based business intelligence service is celebrating a major user growth milestone with a handful of new features, including the ability to import data from an Excel spreadsheet and turn it into live-updating charts and graphs. Power BI now has more than 5 million subscribers, who are using the service to take in business data and create dashboards they can use to better understand their businesses. Subscribers will be able to use an Excel connector to easily “pin” live-updating data from the Excel desktop app to a Power BI dashboard. Both that feature, and one that allows users to analyze data from Power BI in Excel, were previously available for beta testing and are now generally available. Read more [PCWORLD.COM]
  • 34. Application Development NODE.js: Top Reasons to Use Node.js for Web Application Development. There are many reasons why developers (regardless of experience level) should use Node.js for web application development, starting with its speed and ending with its proficiency at multi-user, real-time web applications. Not to mention that three years ago Nodejitsu reached out to the npm community for help running the public npm servers and raised over $300,000 for the project, proving that the community is both active and generous. Read more [JAXENTER.COM]
  • 35. BYOD
  • 36. BYOD MOBILE SECURITY: BYOD Can Pose Privacy Risks to Employees. Companies using MDM to oversee employee devices are collecting more information than employees realize. Read more [CSOONLINE.COM] EDUCATION: What Are the Best BYOD Tools for Presentation, Collaboration and More? Besides simply having technology in the classroom through BYOD programs or others, schools are increasingly being pushed to use it well and limit the “digital use” gap that exists between students from low-income families and their wealthier peers. Active tech use, while challenging, is critical for the next phase of K-12 education technology. Read the rest [EDUCATIONDIVE.COM]
  • 37. BYOD ENTERPRISE: Dude, Where’s My Phone? BYOD Means Enterprise Security Exposure. You should be worried, very worried, if an employee loses a smartphone or tablet— especially if that employee accesses any enterprise resources using that device. Find out more [NETWORKWORLD.COM] OPINION: BYOD? More Like “Bring Your Own Divide”. There is no way around it: the modern workforce is mobile and relies on CXOs to deliver enterprise security in the clearest way possible – no matter where they find themselves. CXOs need to embrace their businesses operational models and define strategies to secure critical data. Read more [INFOSECURITY-MAGAZINE.COM]
  • 39. Big Data TECH: Building Your Big Data Infrastructure: 4 Key Components Every Business Needs To Consider. Big data can bring huge benefits to businesses of all sizes. However, as with any business project, proper preparation and planning is essential, especially when it comes to infrastructure. Until recently it was hard for companies to get into big data without making heavy infrastructure investments (expensive data warehouses, software, analytics staff, etc.). But times have changed. Cloud computing in particular has opened up a lot of options for using big data, as it means businesses can tap into big data without having to invest in massive on-site storage and data processing facilities. Read more [FORBES.COM]
  • 40. Big Data TERROR: Now Can Big Data Fight Terror? Why don’t officials know when an Omar Mateen buys a mass-murder weapon? What are we getting from government investment in big data? Read the rest [WSJ.COM] SECURITY: Big Data Will Fix Internet Security…Eventually. Security analytics have been with us for a while, but with the latest tech, it’s much easier to detect malicious attacks. Find out more [INFOWORLD.COM] PRIVACY: iPhone, AI and Big Data: Here’s How Apple Plans to Protect Your Privacy. Can Apple take the ‘big brother’ out of big data? Read more [ZDNET.COM]
  • 42. Mobile Applications STUDY ON USAGE: Nearly 1 in 4 People Abandon Mobile Apps After Only One Use. Apple’s iTunes App Store is home to over 1.5 million apps and Google Play hosts over 2 million, but the number of apps that actually get installed and used on consumers’ devices is still quite small. We already knew that people only interacted with a small handful of third-party apps on a regular basis, and now, according to a new study on mobile app usage, we learn that about one in four mobile users only use an app once. Read the rest [TECHCRUNCH.COM]
  • 43. Mobile Applications DEVOPS: Mobile App Development – 8 Best Practices. Creating great mobile enterprise apps isn’t necessarily easy, but it can be easier if you follow these eight critical tips. Find out more [INFORMATIONWEEK.COM] RED HAT: Takes Application Development to the Bank. The open source juggernaut’s remarkably steady growth depends less on Linux every year. Read more [INFOWORLD.COM]
  • 44. Mobile Applications CONSUMER TECHNOLOGY: Facebook, Google Dominate List of Top 15 Mobile Apps. Tech behemoths Facebook and Google own more than half of the 15 most popular mobile applications used by U.S. adults — the reach of other well-liked apps such as Snapchat and Apple Maps doesn’t even compare. Read more [CIO.COM]
  • 46. Personnel Management WORKFORCE: Millennials Want to Stay, If Government Grasps the New Reality. Many “millennials” in government say their agencies haven’t yet understood what makes them tick. And their generation isn’t drastically different than the ones that have come before it. Though a majority of federal employees under the age of 35 indicated their interest in staying within the federal government, many millennials said their decision depends on several different factors. Read the rest [FEDERALNEWSRADIO.COM] OPM: Office of Personnel Management Hires First CISO. Following one of the largest data breaches on record, the Office of Personnel Management hires a chief information security officer. The new CISO is Cord Chase, former senior adviser on Cyber and National Security to the White House and Office of Management and Budget, and technology head and engineer at the U.S. Department of Agriculture. Find out more [GOVTECH.COM]
  • 47. Personnel Management DOD: The 4 Big Takeaways from Ash Carter’s New Push for Military Personnel Reform. The plan to overhaul the military personnel system that Defense Secretary Ash Carter announced Thursday would end the “one-size-fits-all” promotion system for military officers and clear the way for far more diverse options in military career tracks. Read more [MILITARYTIMES.COM] FEDERAL CIVIL SERVICE: Report Says Top Civil-Service Rank Needs Urgent Boost. The Senior Executive Service, the highest rank of the nation’s federal civil service, carries a certain prestige. But that is not enough to convince many lower-ranking employees that the status is worth the headache. Read more [WASHINGTONPOST.COM]
  • 48. Programming & Scripting Development Client & Server-Side
  • 49. Programming & Scripting Development Client & Server-Side JAVASCRIPT: F# Functional Programming Comes to JavaScript. The Fable compiler gives developers the opportunity to unite the realms of F# functional programming and JavaScript. In a beta stage of development, Fable leverages F# and uses Babel compilers to generate source maps. A 1.0 release is due soon. Read more [INFOWORLD.COM] JAVA: Google Wins Java Copyright Case Against Oracle. Federal jury finds Google’s use of Java software was “fair use”. A federal jury found Google’s use of Oracle Corp.’s Java software in its mobile products didn’t violate copyright law, a verdict cheered by many in Silicon Valley who believe it will protect how they write and use software. The decision, which Oracle said it would appeal, marked the latest chapter in a six-year legal battle in which Oracle sought as much as $9 billion from Google for using 11,000 lines of Java software code in its Android software. Read the rest [WSJ.COM]
  • 50. Programming & Scripting Development Client & Server-Side C#: Mads Torgersen and Dustin Campbell on the future of C#. How has open source changed it – and can it survive Windows PC decline? This is a moment of change for Microsoft’s development tools, as the company transitions from focusing entirely on Windows, to creating cross-platform tools that it hopes will push developers towards its Azure cloud services, either as a back-end for mobile applications, or as a deployment platform for server applications irrespective of the operating system. Find out more [THEREGISTER.CO.UK]
  • 51. Programming & Scripting Development Client & Server-Side HTML5: HTML5 by Default: Google’s Plan to Make Chrome’s Flash Click-to-Play. Top 10 sites will be whitelisted, everything else will default to HTML5. Google will be taking another step towards an HTML5-only Web later this year, as the systematic deprecation and removal of Flash continues. In a plan outlined last month, Flash will be disabled by default in the fourth quarter of this year. Embedded Flash content will not run, and JavaScript attempts to detect the plugin will not find it. Whenever Chrome detects that a site is trying to use the plugin, it will ask the user if they want to enable it or not. It will also trap attempts to redirect users to Adobe’s Flash download page and similarly offer to enable the plugin. Read more [ARSTECHNICA.COM]
  • 52. Programming & Scripting Development Client & Server-Side JAVA: Java’s Spring Framework Gets a New Competitor. Datamill, an open source framework that leverages Java 8 and lambdas, is bringing functional programming to Java-based web development. Read more [INFOWORLD.COM] JAVASCRIPT: New Ransomware Strain Coded Entirely in Javascript. Security researchers have discovered a new strain of ransomware coded entirely in Javascript, which could increase its chances of being activated. Read the rest [BBC.COM]
  • 53. Programming & Scripting Development Client & Server-Side HTML5: W3C’s Rejected HTML5 Proposal Imperils Security Researchers. The World Wide Web Consortium (W3C) is embroiled in an ongoing dispute over digital rights management for HTML5. In the latest development of the dispute, W3C digital rights management (DRM) working group chairman Paul Cotton vetoed a proposal to discuss HTML5 standards before renewing the group’s charter. Find out more [SCMAGAZINE.COM] PROGRAMMING: The 9 Most In-Demand Programming Languages to Learn. With the help of this list from Codingdojo, here are the nine most in-demand coding languages that you should learn, no matter what profession you’re in. Read more [TECH.CO]
  • 55. Cloud Computing CLOUD EXPO: Conference Short On Innovation, Still Provides Value. Jason Bloomberg has attended Sys-Con’s Cloud Expo conference several times both in New York and Silicon Valley over the last few years, but last week’s installment at Manhattan’s Javits Convention Center seemed a mere shell of its former self. Why the drop-off this year? Read more [FORBES.COM] STORAGE WARS: How the Federal Government is Tackling Data Growth. With more devices collecting data, agencies find themselves with larger amounts of data than ever before. To manage that growth, and avoid letting it overwhelm them, federal IT leaders leverage storage solutions that can securely host large volumes of data without overburdening the budget. Find out more [FEDTECHMAGAZINE.COM]
  • 56. Cloud Computing AWS: Cloud Computing Ops, Data Centers, 1.3 Million Servers Creating Efficiency Flywheel. Oppenheimer is betting that Amazon shares can get to $930. The primary reason: AWS is a profit machine that’ll deliver 2023 revenue topping $57 billion. In a nutshell, Oppenheimer concludes that AWS’ capital spending won’t need to be as high as expected. Why? “AWS’ competitive advantages in procuring, designing and architecting datacenters and compute/storage resources are driving even higher profitability and lower capital intensity than previously expected.” Read the rest [ZDNET.COM]
  • 57. Cloud Computing FEDERAL CIOs: Need Help with Legacy-to-Cloud Transition. Government IT leaders stress value in private-sector partnerships, repeatable contracting provisions as they look to incremental modernization strategies. “Modernization” was one of the watchwords in President Obama’s proposal for the federal IT budget in fiscal 2017, and while that broad effort might sound anything but controversial, updating legacy systems entails a host of challenges that agency CIOs are only beginning to work through. Read more [CIO.COM]
  • 58. Cloud Computing GOOGLE: Google Reportedly Looking to Commercialize Its Spanner Database. The company wants to see if it can use its massive database technology to compete better with Amazon Web Services and Microsoft Azure. One of the biggest obstacles facing the company as it embarks on its mission is finding a way to decouple Spanner from Google’s proprietary hardware and network technology and building a version that will work just as well on other infrastructures. Read the rest [EWEEK.COM] BREXIT: Brexit Spells Turbulence for Cloud Computing: 6 Stormy Scenarios. The fallout from the U.K. leaving the EU is just starting. Here’s a look at how large cloud computing vendors may be affected. Get ready for the pause in U.K. data center build-outs. Find out more [ZDNET.COM]
  • 59. Cloud Computing AMAZON: Gets High-Level U.S. Government Clearance For Cloud Computing. Amazon has received high-level authorization for its Amazon Web Services, opening the door for U.S. government agencies to store highly sensitive but unclassified data on its cloud computing platform. The authorization is known as the Federal Risk and Authorization Management Program (FedRAMP) high baseline, a standard set of security requirements for cloud services. It covers more than 400 security controls and gives U.S. government agencies the ability to leverage AWS for highly sensitive workloads, including patient records, financial data, law enforcement data and other controlled-but-unclassified information. Read more [INVESTORS.COM]
  • 60. Cloud Computing SAMSUNG: Snaps Up Joyent, the Best-Kept Secret in Cloud Computing. One of the best-kept secrets in cloud computing has just found a new home. Samsung Electronics announced Wednesday that it will acquire Joyent, a vital but lesser- known player the cloud hosting market – and one with quite a history behind it. Read more [WIRED.COM]
  • 62. Business Intelligence OPEN SOURCE: Top 7 Open Source Business Intelligence and Reporting Tools. In economies where the role of big data and open data are ever-increasing, where do you turn in order to have data analysed and presented in a precise and readable format? Here’s a list of top open source business intelligence (BI) and reporting tools that can help. Read the rest [OPENSOURCE.COM] HADOOP: Hadoop Public Cloud Service. BlueData of Santa Clara, California specializes in enabling big data-as-a-service, letting organizations spin up virtual Hadoop or Spark clusters and providing on-demand access to applications, data, and infrastructure to data scientists and data analysts. This week BlueData announced that the enterprise edition of its BlueData EPIC software will run on Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, and other public cloud services. Find out more [INFORMATIONWEEK.COM]
  • 63. Business Intelligence NoSQL: Database Technology Finds Use Cases, But Still Minority Sport. From managing water meter data, through Bitcoin and video data, to web publishing, NoSQL database technology is finding real use cases. But it’s likely to be stuck at 10% of the market for some time. Read more [COMPUTERWEEKLY.COM] DATA: Techniques for Moving Computation to Where the Data Lives. Building in- memory data structure stores helps achieve operational intelligence. Read more [DZONE.COM]
  • 64. IT Security | Cybersecurity
  • 65. IT Security | Cybersecurity STATE CIOS: State CIOs Struggle with Cybersecurity, Cloud Computing Amid Rampant Workforce Changes. For the U.S. to effectively digitize their infrastructure, the National Association of State CIOs said a stable and talented workforce is needed. Doug Robinson, NASCIO executive director, pinpointed cybersecurity, evolving service delivery models, workforce renewal, and the prevalence of data as the key challenges facing governments. Robinson also put forth measures to address them. Read more [HEALTHCAREITNEWS.COM]
  • 66. IT Security | Cybersecurity WHY: Car-Hacking Could Threaten the Federal Government. The latest Government Accountability Office vehicle cybersecurity report found that modern cars, especially those made in 2015 or later, are highly susceptible to hacking that could allow for the remote takeover of the vehicle. The problem, according to the report, is that new systems and features, some of them for safety and some for comfort, are constantly being added to new models. Given that the federal government is the owner of one of the largest fleets of vehicles in the world, the cybersecurity health of such a valuable asset pool should probably be a priority. Read the rest [NEXTGOV.COM]
  • 67. IT Security | Cybersecurity FEDERAL BUDGETS: Cybersecurity Goals to Guide Federal Software Spending. The U.S. government is on track to significantly boost spending on cybersecurity solutions. However, evolving requirements to greatly improve federal protection of information technology resources will shape that spending. In fact, federal cyberprotection goals should be augmented and significantly modified, according to recent studies of the federal market. The linkage between increased federal investing in cybersecurity and the requirements for bolstering IT protection are portrayed in two newly released reports. Find out more [ECOMMERCETIMES.COM]
  • 68. IT Security | Cybersecurity CISO: Leading By Example: the Federal CISO and Cybersecurity Collaboration. In 2015, there were 781 known data breaches in the United States, according to the Identity Theft Resource Center, exposing a staggering 169 million records. Records described as government/military accounted for 20.2 percent of those that were exposed via data breach, while healthcare accounted for 66.7 percent of compromised records. And given that many organizations do not report data breaches for fear of damaging their reputations, we know the true numbers are significantly higher. The new federal CISO will have their work cut out for them. We, as a nation, seem to be fighting a losing battle. Yet, with every challenge comes opportunity to disrupt the status quo. As the new CISO enters the volatile cybersecurity landscape, there are multiple areas in which he or she can have an impact through industry collaborations offering new technologies and innovations. Read more [FCW.COM]
  • 69. IT Security | Cybersecurity PATCHES: Microsoft Acknowledges Permission Problems with MS16-072 Patches. The patches all aimed at fixing Group Policy, but in the end they break Group Policy. Problems are being reported with the MS16-072/KB 3163622 patch. Admins are saying it breaks some Group Policy settings: drives appear on domain systems that should be hidden, mapping drives don’t work, and other typical GPO settings aren’t getting applied. Read more [INFOWORLD.COM]
  • 70. IT Security | Cybersecurity DOD: Bug Bounty Hunters Discover Over 100 Security Flaws During DOD Contest. Participants in the first-ever “Hack the Pentagon” bug bounty contest found more than 100 vulnerabilities in the Defense Department’s computer systems. The program, the first-ever of its kind offered by the federal government, invited hackers to test the cybersecurity of some public U.S. Department of Defense websites. A total of 1,400 certified hackers participated in the contest. Read the rest [CIODIVE.COM] FEDERAL: Federal Cybersecurity Boondoggle: The Software Assurance Marketplace (SWAMP). Well-intended DHS program suffers from a lack of relevant features, internal mismanagement, and few actual users. Find out more [NETWORKWORLD.COM]
  • 71. IT Security | Cybersecurity INDUSTRY INSIGHT: Extending Cybersecurity to Fraud Analytics. Information security leaders often defend against cyber threats by focusing on traditional IT tools and techniques — firewalls, intrusion detection and prevention systems, malware detection and analysis and the like. As organizations have locked down systems with more sophisticated defense-in-depth technical controls, adversaries have evolved to take advantage of information systems by impersonating regular users. While there are some similarities between cybersecurity and fraud, traditional cybersecurity monitoring and analytics must evolve in order to identify the fraudulent use of IT systems that may otherwise go unnoticed. Read more [GCN.COM]
  • 72. From the Blue Mountain Data Systems Blog Three-Dimensional Governance for the CIO https://www.bluemt.com/three-dimensional-governance-for-the-cio 7 Reasons to Take Control of IT Incidents https://www.bluemt.com/7-reasons-to-take-control-of-it-incidents/ Breach Mitigation Response Time Too Long, Survey Says https://www.bluemt.com/breach-mitigation-response-time-too-long-survey- says/ Six Tactics for Cyberdefense https://www.bluemt.com/six-tactics-for-cyberdefense/
  • 73. From the Blue Mountain Data Systems Blog Feds Report Mixed Responses to Shared Services https://www.bluemt.com/feds-report-mixed-responses-to-shared-services Federal Employees Are Not Security Experts https://www.bluemt.com/federal-employees-are-not-security-experts Survival Guide for Network Administrators https://www.bluemt.com/survival-guide-for-network-administrators DBaaS: OpenStack Trove Changes DB Management https://www.bluemt.com/dbaas-openstack-trove-changes-db-management
  • 74. From the Blue Mountain Data Systems Blog Help Wanted: Certified Cybersecurity Professionals https://www.bluemt.com/help-wanted-certified-cybersecurity-professionals Cyber Threat Intelligence Integration Center Preview https://www.bluemt.com/cyber-threat-intelligence-integration-center-preview/ Cloud Moves in 1-2-3 https://www.bluemt.com/cloud-moves-in-1-2-3/ Change Management for Disaster Recovery https://www.bluemt.com/change-management-for-disaster-recovery/
  • 75. From the Blue Mountain Data Systems Blog Jeffersonian Advice For C-Suite Career Advancement https://www.bluemt.com/jeffersonian-advice-for-c-suite-career-advancement/ Ways To Survive The “Mobile-Pocalypse” https://www.bluemt.com/ways-to-survive-the-mobile-pocalypse/ Microsoft Cloud Services Receive FedRAMP Authority to Operate https://www.bluemt.com/microsoft-cloud-services-receive-fedramp-authority- to-operate/ Hiring Pentesters? Here Are 10 Things You Need to Know https://www.bluemt.com/hiring-pentesters-here-are-10-things-you-need-to- know/
  • 76. From the Blue Mountain Data Systems Blog Home Router Malware Alert https://www.bluemt.com/home-router-malware-alert/ Threat Model Deconstruction https://www.bluemt.com/threat-model-deconstruction/ Business Email Scam Nets $214 Million https://www.bluemt.com/business-email-scam-nets-214-million/ How to Prevent Unauthorized Software from Taking Over Your Organization https://www.bluemt.com/the-cios-guide-to-happy-end-users-2/
  • 77. From the Blue Mountain Data Systems Blog Digital Marketing Predictions for 2015 https://www.bluemt.com/digital-marketing-predictions-for-2015/ SDN: Network Administrator’s Friend or Foe? https://www.bluemt.com/sdn-network-administrators-friend-or-foe/ Mobile Payments: A Must for Federal Agencies https://www.bluemt.com/mobile-payments-a-must-for-federal-agencies/ Soft Skills Are A Must-Have For Careers In IT https://www.bluemt.com/soft-skills-are-a-must-have-for-careers-in-it/
  • 78. From the Blue Mountain Data Systems Blog Security Risks Most Prevalent in Younger Workers https://www.bluemt.com/security-risks-most-prevalent-in-younger-workers/ The Security World’s Maturation https://www.bluemt.com/the-security-worlds-maturation/ Data Breach Concerns Keep CISOs Up At Night https://www.bluemt.com/data-breach-concerns-keep-cisos-up-at-night/ Personalized Govt Equals Instant Gratification for Citizens https://www.bluemt.com/personalized-govt-equals-instant-gratification-for- citizens/
  • 79. From the Blue Mountain Data Systems Blog People-Centric Security https://www.bluemt.com/people-centric-security/ Pentagon Tries BYOD To Strike Work/Life Balance https://www.bluemt.com/pentagon-tries-byod-to-strike-worklife-balance/ Open Source Model Considered for MS Windows https://www.bluemt.com/open-source-model-considered-for-ms-windows/ Open Internet: To Be or Not to Be? https://www.bluemt.com/open-internet-to-be-or-not-to-be/
  • 80. From the Blue Mountain Data Systems Blog Malware Stays A Step Ahead Infecting One Third of Websites https://www.bluemt.com/malware-stays-a-step-ahead-infecting-one-third-of- websites/ Machine-Generated Data: Potential Goldmine for the CIO https://www.bluemt.com/machine-generated-data-potential-goldmine-for-the- cio/ Government Legacy Programs: Reuse vs. Replacement https://www.bluemt.com/government-legacy-programs-reuse-vs-replacement/ It Takes a Whole Village to Protect Networks and Systems https://www.bluemt.com/it-takes-a-whole-village-to-protect-networks-and- systems/
  • 81. From the Blue Mountain Data Systems Blog Governance For the CIO https://www.bluemt.com/governance-for-the-cio/ Help Desk Consolidation – Lessons Learned https://www.bluemt.com/help-desk-consolidation-lessons-learned/ One Year Later, Companies Still Vulnerable to Heartbleed https://www.bluemt.com/one-year-later-companies-still-vulnerable-to- heartbleed/ Federal Projects Cultivate Worker Passion https://www.bluemt.com/federal-projects-cultivate-worker-passion-2/
  • 82. ABOUT US Blue Mountain Data Systems Inc. Blue Mountain Data Systems Inc. is dedicated to application and systems development, electronic document management, IT security support, and the automation of workflow processes. Read more about our experience here: >> http://bluemt.com/experience
  • 83. Recent Experience U.S. Dept. of Labor Employee Benefits Security Administration 1994 to Present Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support.
  • 84. MANAGEMENT Paul T. Vesely Founder, President, CEO and Principal Architect Mr. Vesely is a recognized thought leader in systems architecture and delivery, having designed and delivered many enterprise wide information and document management solutions. Mr. Vesely’s history includes 33 years experience in the information systems industry, with Unisys, Grumman, PRC and a host of clients in both government and private sectors.
  • 85. CONTACT US Contact Us Today to Discuss Your Next IT Project HEADQUARTERS 366 Victory Drive Herndon, VA 20170 PHONE 703-502-3416 FAX 703-745-9110 EMAIL paul@bluemt.com WEB https://www.bluemt.com