blue-mountain-cloud-computing2CLOUD COMPUTING & SERVICES

ENTERPRISE: Lessons learned in building a secure cloud product. Enterprises wanting to move to the cloud, or ensure the best results and return on their existing clouds, would do well to seek best practice guidance from the industry. Read more

FORECASTS: Roundup Of Cloud Computing Forecasts And Market Estimates, 2015. Consultancies and research firms have varying forecasts for the next few years, yet all agree that cloud computing adoption is accelerating in enterprises on a global scale. Here are some key take-aways: Read more

QUESTION: What happens when data gets lost from the cloud? Cloud data storage has worked well for long, so it’s natural to assume that everything is safe, particularly because the transfer and backup process is transparent and automatic. However, cloud data is vulnerable to the same threats as the internet as a whole. Here’s a run-down of some of those threats: Read more

STATE GOVERNMENTS: Getting IT Right? How State Governments are Approaching Cloud Computing. Cloud
computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. Here’s how to understand how well state government is prepared to address the challenges of cloud computing. Read more


CTO: White House CTO calls for open source APIs and visibility for women. U.S. citizens create world-beating tech sites like Amazon, Facebook and Twitter — so why can’t agencies like the IRS or Veterans Affairs do the same? The White House’s chief technology officer, Megan Smith, suggested it’s possible, provided the government can attract enough people with a high TQ, or technology quotient, to work there. Read more

CISO: 7 CEOs Share Why CISOs Need To Be Involved In The Boardroom. Whether it’s a Chief Information Security Officer (CISO) or just a Chief Security Officer (CSO), the “Chief” part implies that the position is an upper-level executive role. It should be expected that the CISO be a part of boardroom discussions—both so that the board and the rest of the executive management team knows where things stand from a risk perspective, and so that the CISO is part of the conversation as it relates to business goals. Read more

CIO: NGA to reorganize CIO, IT services departments. Next month, the National Geospatial-Intelligence Agency (NGA) will be merging its top IT offices into a single department. Beginning Feb. 15, IT services and the office of the CIO will be combined under a single IT architecture. The new setup is designed to speed adoption of new technologies within the agency and help it meet the mission of providing critical data to the intelligence community. Read more


POLICY: NSA reform still cyber bill’s biggest hurdle. Lawmakers’ enthusiasm for passing a cybersecurity bill will face a major hurdle this summer — National Security Agency (NSA) reform. By June 1, Congress must reauthorize the sections of the Patriot Act that are the basis for the NSA’s most controversial surveillance programs. Surveillance concerns have taken a back seat to cybersecurity following the dramatic hack on Sony and a subsequent White House cyber push. But many believe NSA reforms are crucial before the centerpiece of the White House’s cybersecurity proposal – cyber information sharing between the public and private sector – can pass Congress. Read more

ADVICE: 10 Cyber Security Tips All Employees Need To Know, Including Phishing Scams & BYOD. Employers want to blame cyberthreats on bad guys but “the threat actually originates from within when employees’ ignorance and/or negligence opens the door for cybercriminals” as reported by Kasperky in “Top 10 Tips for Educating Employees about Cybersecurity.” Find out more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – January 28, 2015

Leave a Reply