FOR THE CTO, CIO & CISO
PLAN OF ACTION: Angles of Exposure and Countermeasures. The increasing sophistication of outside cyber attacks has been met with advancements in outside cyber threat detection, response tools, and training methods. Still, managers must not underestimate the critical threat posed by individuals within the organization, as opposed to a third party attacker. Read more
SLIDESHOW: How to Use Big Data for a Good Cause. News of fraud and data breaches can shake confidence and cause legitimate concerns, but not all data stories have a foreboding end. Experian DataLabs wants to call attention to the good that data can do. Read more
SECURITY LEADERSHIP: Five Tips To Comply With The New PCI Requirements. Merchants that accept payment cards have five new security requirements to comply with — and significant fines and other costs if they don’t. The new rules are part of the new Payment Card Industry Data Security Standard. Here is some advice from Trustwave Holdings, a PCI compliance consulting firm.Read more
MEET LILY: The $499 ‘Selfie Drone’ That’s Your Personal Videographer. Yes, in 2015 we have drones to take selfies for us, because maintaining the perfect duckface while tapping a touchscreen button are sorely testing humanity’s multi-tasking capabilities. Read more
TECH REVIEW: BitTorrent’s Bleep Is a Messaging App Built for Secrecy. Yes, you read that right, BitTorrent-the same company behind everybody’s favorite music, movie and TV show, uh, sharing technology. It’s in the middle of refashioning itself into an upstanding consumer tech company. Read more
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.