Password ProtectionCYBERSECURITY

FREAK VULNERABILITY: Why Did It Take Microsoft So Long to Acknowledge a Huge Security Hole That It Found? A team of researchers announced the latest widespread security vulnerability. Called FREAK, an acronym that might actually be better than POODLE, it’s a flaw that affects how HTTPS secure connections are established between browsers and Web servers, downgrading the connection to a weaker, more crackable encyrption. Read more

ASSESSMENT TOOLS: Senate Offices Want New System To Track Website Vulnerabilities. While Congress is preparing for what are sure to be noisy debates about cybersecurity legislation, Capitol Hill administrators are quietly beefing up their own network defenses. Read more


DATA ACCESS: Feds Tap Zillow’s Chief Economist For Open-Data Initiative. Zillow Chief Economist Stan Humphries has been named to an advisory panel that the federal government says will help it do a better job unleashing vast troves of data to foster economic growth and promote better decision-making — including census data served up by real estate search sites. Read more

DIGITAL GROWTH: Openness Prevails But What Is Open Data? On Barack Obama’s first official day in office, he declared that “in the face of doubt, openness prevails” and brought the open data movement to the fore in the USA. Read more


OPERATIONS: CIOs, Dashboards and the Cobbler’s-Children Syndrome. Many governments are embracing data analytics, both for public consumption and to guide their internal work. But there’s one area that’s missing out: IT departments’ own operations. Read more

ISAOS: Order Aims for Voluntary Cybersecurity Information Sharing. The President has signed an order calling on DHS to encourage the formation of organizations that would share information related to cybersecurity risks and incidents and help those voluntary groups partner with federal agencies. Read more

IT NEWS RADIO: The Nature of Cyber Intelligence. Lance James, head of cyber intelligence for Deloitte, joins host Derrick Dortch to discuss how cyber intelligence has changed in recent years for both the federal government and the private sector. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – April 13, 2015

Leave a Reply