HIRING: 4 Types Of Geeks You Need And How To Recruit Them. While recruiting and hiring focuses on matching individuals’ unique qualities and qualifications with the needs of an open job, when it comes to hard-core tech recruiting, these ‘geek” candidates tend to fall into one of four specific types, according to insight from Wisegate, an IT research services firm. Read more

PORTFOLIO MANAGEMENT: Managing IT for a Diverse Portfolio of Businesses. When Jeff Bezos purchased the Washington Post for $250 million in 2013, the portion of the company that was not purchased was rebranded as Graham Holdings. Its holdings include Kaplan, Slate, multiple television stations, CableOne, and Graham Media Group (which is the former Post-Newsweek Stations), among others. Read more

WORKFORCE: Painful Hiring Keeps Tech Talent At Bay (But Does Money Matter?). Highly skilled cyber pros aren’t staying away from government work because of low pay; they’re staying away because the federal hiring process is all too often a soul-sucking mess. Read more

CSO RISING: What It Means for Corporations and Customers. I often say that the CSO is the “corporate rock-star of the future” because exceptional ones possess a combination of skills that rarely appear in one person. The qualities that boards are looking for in today’s CSOs reflect the complexities of safeguarding company and consumer data in this new threat environment. Read more


CISCO SUBNET: Security Is a Prisoner of the Network. Cybersecurity professionals must gain experience and get comfortable with virtual network security. Read more

TECH DISTRIBUTION COUNCIL: Top 10 Best-Selling Network Security Products In Q1 2015. This quarter’s top-selling network security products included the best of the best from Cisco, Juniper, SonicWall, NetGear and Fortinet, according to data from Port Washington, N.Y.-based NPD Group, which compiles data in its DistributorTrack sales database from leading distributors in the U.S. Global Technology Distribution Council. Read more

CUSTOMER PRIVACY: United Airlines Launches Bug Bounty Program. It’s the first of its kind in the airline industry — United Airlines is launching a bug bounty program that aims to protect Relevant Products/Services customer personal data Relevant Products/Services and privacy. But at least one technology market watcher said the timing could reflect negatively on the airline. Read more

GOVERNMENT INVESTMENTS: Mozilla Pushes Web Sites To Adopt Encryption. The organization behind the Firefox Web browser wants to see Web site encryption become standard practice, and it has laid out a two-part plan to help that happen. Mozilla said it plans to set a date by which all new features for its browser will be available only to secure Web sites. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – July 16, 2015

Leave a Reply