CYBERSECURITY
COMPLIANCE: Four Steps To Implementing New SEC Cybersecurity Guidelines. In April the US Securities and Exchange Commission’s Division of Investment Management released cybersecurity guidance for registered investment firms and advisors. It was hardly a surprise. The SEC has shown increasing interest in cybersecurity in recent years, urging publicly traded companies to discuss cyber risks and disclose data breaches in public filings. Read more
[FORBES.COM]
BUSINESS REPORT: When A Data Breach Hits, Enterprises Turn To Outside Firms To Pick Up The Pieces. CIOs and CISOs are tasked with defending and protecting corporate enterprises in an increasingly hostile cyberscape. Companies across all industries worldwide reported a total of 42.8 million detected attacks last year, according to the PWC Global State of Information Security Survey 2015. That’s a 48 percent increase in incidents since the prior year. Read more
[CSOONLINE.COM]
NEW INITIATIVE: Google Dials In on Citywide Wi-Fi With Old Phone Booths — But Is Security on the Line? When tech companies want to dig deep and innovate, they hole up in Silicon Valley. When it’s time to make headlines, however, there’s a different destination: New York City. Search giant Google is the latest to roll out a new project in the Big Apple with the launch of LinkNYC, which aims to repurpose more than 10,000 payphones and turn them into so-called Wi-Fi pylons. Read more
[SECURITYINTELLIGENCE.COM]
HOW TO: Find The Best Cyber Security Insurance For Your Firm. A robust cyber security insurance policy can be tricky to procure, even for the most meticulous wealth management firms. Interest in cyber insurance has surged over the past year following a number of high-profile hackings, including one announced earlier this month involving the U.S. Office of Personnel Management. Read more
[REUTERS.COM]
FEDERAL, STATE AND LOCAL TECH
VETERANS AFFAIRS: VA Gets Serious About PIV, Two-Factor Authentication During Cybersecurity Sprint. The Veterans Affairs Department is using the recent information system breaches at the Office of Personnel Management as an opportunity to review current security practices and push existing protocols that may not have been fully implemented. It’s all part of the work being done at VA as part of a post-OPM breach “30-day cybersecurity sprint” orchestrated by the Office of Management and Budget. Read more
[FIERCEGOVERNMENTIT.COM]
IMPENDING COLLABORATION: FCC Poised To Approve AT&T-DirectTV Merger. The Federal Communications Commission is preparing to sign off on AT&T’s proposed merger with DirecTV, Reuters reported. Though the agency is reportedly likely to ask for conditions on the deal, none of them are severe enough to cause AT&T to call off the transaction. Read more
[THEHILL.COM]
NOAA NEWS: Flexible Cloud Enables Mammoth Computing. Producing 20 terabytes of data every day, the National Oceanic and Atmospheric Administration is a prime example of the need for flexibility. And through its Big Data Project, NOAA’s bringing private-sector ingenuity to bear on the age-old problem: How can government get its work into the hands of the people who want it? Read more
[FCW.COM]
MOBILEIRON PLATFORM: Feds Take Evolutionary Path to Enterprise Mobility Management. he U.S. Department of Agriculture deployed mobile device management a few years ago but quickly recognized it would need more functionality. Janell Duke, deputy director of the USDA’s Infrastructure Operations Division, says that’s why the agency opted for MobileIron. Read more
[FEDTECHMAGAZINE.COM]
==========
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.
==========