employee-monitoringFOR THE CTO, CIO & CISO

INSIDE VULNERABILITIES: When It Comes to Security, Can You Identify Insider Threats? Data breaches don’t always come from faceless varmints on the other side of the world — sometimes they come from within an organization. To address the evolving insider threat landscape, enterprises need to think about their own potential for insider threats. Read more

WOMEN EXECS: How Working Moms Can Rise To The C-Suite. One of the biggest biases that working mothers face is the belief that rising to the executive ranks means doing more when, in actuality, it means doing things differently. Read more [FORTUNE.COM]

WORKFORCE: Top 10 Oddball Tech Job Interview Questions. Interviewing for a new job is never an easy task. You try to anticipate the questions, study up on the company, get to know the person you’re interviewing with, wear your lucky suit and do mock interviews. Read more


BIG DATA: Discovering the Value of Virtualization and Cloud. The age of big data is here and with it comes a unique set of problems. Anne Buff, business solutions manager for SAS best practices at the SAS Institute, hopes to help companies avoid those pitfalls by showing the importance of virtualizing data environments or taking advantage of cloud technologies. Read more

SDN: Cisco Boosts Network Programmability. Cisco Systems Inc. this week enhanced its portfolio of service provider solutions with increased programmability and virtualization features, furthering its application-centric vision of new-age networking highlighted by new technologies such as software-defined networking (SDN). Read more

AMAZON WEB SERVICES: Virtualization Isn’t For Everyone, But It Can Be Fun. Visualization allows a single computer (the host) to run multiple independent virtual computers (called guests) in software. Before virtualization, if you needed four servers, you had four physical systems. Now, with virtualization, you have one physical computer that runs four virtual servers in software. Read more


CISA BILL: Simple Question: What Cyberattack Would The New Cybersecurity Bill Have Stopped? The Senate Intelligence Committee voted (in secret, of course) to approve a new cybersecurity bill, dubbed CISA (as it was in the last Congress), though it kept the content of the actual bill secret until this week. Read more

ADWARE: Cybersecurity At SXSW: Dell Expert On The Dangers Of Bloatware. Fortune discussed the challenges of countering adware and other cybersecurity threats with Dell’s Brett Hansen at South by Southwest. Read more

DATA AT RISK: Cybersecurity Experts Show Concern Over Wearable Security. The Apple Watch will be released in late April and should bring immediate attention to the wearables market – but that has some cybersecurity experts concerned. More users will rely on their smartwatches to make payments, conduct business communications, and save sensitive information for easier access.
Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – April 27, 2015

Leave a Reply