FOR THE CTO, CIO & CISO
CLOUD COMPUTING: Why the Enterprise Cloud Needs Shadow IT to Succeed. Who is really responsible for cloud initiatives in the enterprise? Some say central IT, but studies show that is most certainly not the case. Enter shadow IT, which is very much alive and well in the enterprise. Read more
[CIO.COM]
RESTful API: Microsoft’s Onedrive Cloud Storage API Is Now Available For Developers. MICROSOFT’S QUEST for groovy hippy love vibes continues, as the firm announces the OneDrive API allowing developers access to its back end. Read more
[THEINQUIRER.NET]
CAREERS: Why Confidence Is Falling for IT Workers. Overall confidence among IT workers has noticeably declined since the middle of 2014, according to recent survey findings. Contributing factors include a lack of conviction about prospects for the overall national economy, as well as increasing reservations among tech professionals about their employers’ future. Read more
[CIOINSIGHT.COM]
SURVEY: Open Source Jobs: It’s A Seller’s Market. Open source infrastructure skills are in high demand. Together with recruitment company Dice, the Linux Foundation’s survey of 4,456 people found that nearly all the hiring managers interviewed had jobs available for “Linux professionals” — a catch-all description embracing both developers and system administrators. Read more
[INFOWORLD.COM]
CYBERSECURITY
BOOKMARKS: The Best 35 Information Security Blogs To Follow. Whether you prefer bookmarks, RSS feeds, or mobile readers, keeping up with information security trends and developments is made infinitely easier through the work of great bloggers. We’ve scoured the Internet for the best of the best, and compiled this list to help you find your next set of bookmarks. Read more
[GFI.COM]
STOLEN CREDENTIALS: Domain Shadowing Latest Angler Exploit Kit Evasion Technique. The Angler Exploit Kit continues to evolve at an alarming rate, seamlessly adding not only zero-day exploits as they become available, but also a host of evasion techniques that have elevated it to the ranks of the more formidable hacker tool kits available. Read more
[THREATPOST.COM]
HACKER REWARD: Company Victimized By Ddos Offers A 100 Bitcoin Bounty To Unmask Its Attacker. Last November the Helsinki-based Bitcoin service Bitalo was hit by a DDoS attack that lasted two days. The attacker (known as DD4BC) contacted Bitalo to demand a ransom of 1 Bitcoin (about $326 USD) to stop the attack and to provide information on how he or she did the attack. Read more
[SECURITYBISTRO.COM]
==========
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.
==========