NETWORKS: The Incident Response “Fab Five”. CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation. Read more
[NETWORKWORLD.COM]
FEDERAL GOVERNMENT: Incident Response in the Spotlight. The White House is devising a plan specifying federal agencies’ responsibilities in the event of a crippling cyberattack, which could be released as an executive order or presidential directive in the next few months, MC has learned. The guidance will address the federal response to a cyberattack against “critical infrastructure,” including power plants, chemical facilities, banks and telecommunications providers, according to industry officials. The goal is to ensure agencies are focused on chasing hackers out of compromised systems rather than figuring out who to call or talking to lawyers. Read more
[POLITICO.COM]
OPINION: A Breach is Coming — Is Your Agency Ready? Advanced threats are spreading at an alarming rate, putting agency data at risk and making attacks almost inevitable. In July, the Government Accountability Office reported that information security incidents involving federal agencies skyrocketed from 5,503 in fiscal 2006 to 67,168 in fiscal 2014. Read more
[FCW.COM]
VICTIMS OR VILLAINS: Intelligent Incident Response Can Save the Day. We all know the lessons of nursery school tales: don’t lie, don’t steal, and play nice with others. The data breach morality tale is a bit more complicated. When you find out someone is stealing from you: don’t lie, act quickly, and be nice even when everyone’s mad at you. If you get defensive or try to be sneaky, you’ll go from victim to villain in the swipe of a headline. Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before. Read more
[INFOSECURITY-MAGAZINE.COM]
DATABASES
NoSQL: A Primer on Open-Source NoSQL Databases. A beginner’s guide to the different flavors of NoSQL databases, including key-value, document-oriented, graph, and column-oriented databases. Read more
[DZONE.COM]
OPEN SOURCE: 16 Open Source Big Data Databases. The databases and data warehouses you’ll find on this list are the true workhorses of the Big Data world. They hold and help manage the vast reservoirs of structured and unstructured data that make it possible to mine for insight with Big Data. Read more
[DATAMATION.COM]
SHAREPOINT: Shrinking An Already Ginormous SharePoint Database Transaction Log. What do you do when you can’t avoid huge transaction logs in SharePoint and your files are too large? Read more
[COMPUTERWORLD.COM]
OPEN SOURCE FOR GOVT AGENCIES: Bringing Open Source to Government Agencies. Although the American economy has stabilized, Capitol Hill is still closely examining the spending and budgets of government agencies with an eye toward program cuts wherever possible. With this in mind, government CIOs are always on the lookout for ways to centralize and optimize their existing technology to fit into new budget requirements, and are looking to open source to enhance innovation while reducing costs. In fact, open-source technologies have become a high priority for government agencies as they look to rein in spending while delivering high performing, secure, flexible, and scalable solutions for government IT groups. Read the rest
[DATA-INFORMED.COM]
==========
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
CALL BLUE MOUNTAIN FOR IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2015 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-december-2015.
==========