Password ProtectionCYBERSECURITY

BOT TRAFFIC:Bad Bots Rising. Malicious bots pose a categorical threat to all websites, regardless of size. While larger sites are assaulted by many more malicious bots, the overall risk factor is the same for every website owner; roughly one in three visitors is a malicious agent. Read more

MALWARE: CryptoWall ransomware variant has new defenses. Ransomware has been around for more than a decade, but cybercriminals have resurrected the scam over the last couple of years with surprising success. Files on computers infected with ransomware are encrypted, and victims are encouraged to pay a ransom — usually in the ritual currency Bitcoin — to unlock their files.Read more

CYBERDEFENSE: Who is really responsible for cybersecurity? The security threat continues to grow and IT leaders struggle to deal with an ever-increasing danger. Yet the cyber threat, however significant, only forms one element of corporate security. So who should be responsible for security and how can businesses adopt a more proactive stance to the threats they face? Read more


BLANKET PURCHASE AGREEMENT: The General Services Administration (GSA) is testing the waters to see how it might launch a new governmentwide contract with vendors that specialize in agile delivery services. Read more

LOS ANGELES: LA’S Police Department has already made headlines with its announcement that it will become the nation’s first large police department to give officers body cameras, but now the department is taking the decision one step further. Read more

DRONES: Did you just get a shiny new drone? Now, what will you do with it? Drones or as they are officially known, Unmanned Aircraft Systems (UASs) have flooded the U.S. like a tsunami. Read more


IT BUDGET FORECAST: Security to absorb most increases. Like most IT leaders, you’re probably spending a lot of time this month crunching numbers and preparing an annual tech budget. Read more

CISOs: 4 Wish List Items for 2015. With data breaches increasing in frequency, scope and severity
with every passing year, the CISO has one of the most stressful jobs around. These four things could make the job less anxiety-ridden. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – February 2, 2015

Leave a Reply