IT SECURITY
NIST: Program Closes in on Solutions to Identity Theft and Fraud. The National Strategy for Trusted Identities in Cyberspace at the National Institute for Standards and Technology is getting closer to possible solutions to identity theft and fraud. NSTIK Director Mike Garcia gives Federal Drive with Tom Temin an update on the program. Read more
[FEDERALNEWSRADIO.COM]
NETWORK SECURITY: 83 Percent of U.S. IT Security Pros Feel Pressure to Unveil Projects Before They’re Ready. And 65 percent of information security pros expect to feel more pressure in 2016 than they did last year, a recent survey found. Read more
[ESECURITYPLANET.COM]
BLACKBERRY: Buys Cyber Security Consultancy; Moves Deeper Into Services. BlackBerry said that it has acquired U.K.-based cyber security consultancy Encription, moving the company deeper into the services business as it continues to morph into a more software-focused entity amid its ongoing turnaround. Read more
[REUTERS.COM]
WATCH: Top 5 YouTube Videos for IT Security Professionals. Some of the best videos from around the web, designed to help you (and your stakeholders) understand security, and its increasing importance. Read more
[COMPUTING.CO.UK]
BUSINESS INTELLIGENCE
SOFTWARE: How the Navy Is Navigating the Move Away from SQL Server 2005. With Microsoft on the eve of shuttering support for SQL Server 2005, agencies are planning and carrying out their exit strategies. Read the rest
[FEDTECHMAGAZINE.COM]
GOVT DATA: Bringing Innovation into Cyberdefense Technologies. Hackers use innovative thinking when breaching systems, why can’t government? The difference between a hacker and cybersecurity companies is that a hack has no brand, no national loyalty, no secure employment. Hackers immediately use or develop for their purposes the best hacking technology out there. It is this same innovative thinking we must use in approaching our cyber defense technologies. Read more
[GOVTECH.COM]
HADOOP: How Different SQL-on-Hadoop Engines Satisfy BI Workloads. A new benchmark of SQL-on-Hadoop engines Impala, Spark and Hive finds they each have their own strengths and weaknesses when it comes to Business Intelligence (BI) workloads. Read more
[CIO.COM]
DATA: Search-driven Business Intelligence: Intelligence for a Customer-centric Business World. Irrespective of whether a company wants to boost its customer service efforts, intensify the efficiency of its marketing activities, or increase its competitive edge – in a world in which the customer and customer demands are increasingly becoming the focal point of corporate strategic thinking, the “Three Rs” of business success are crucial: the right information to the right person at the right time, as Forrester spells out in a current report. Read more
[COMPUTERWEEKLY.COM]
==========
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-january-2016.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
==========