NETWORK SECURITY
DATA TRACKING: Do You Know Where Your Sensitive Data Lives? Challenges with tracking where sensitive and regulated data is flowing, and the inability to control that flow in outsourced environments such as SaaS cloud applications, where it can move freely between data centers and cloud provider’s partner’s systems, is a key challenge for enterprises in regulated sectors.
Read more
[NET-SECURITY.ORG]
CHECKLIST: Eight Things You Need to Know Before Deploying a Cyber-Threat Intelligence Solution. Protecting against cyber-attacks is proving to be a real challenge. A few years ago, defense-in-depth was the recommended methodology to successfully fight cyber-attacks. Despite the proliferation of defense-in-depth mechanisms, a large number of high profile cyber-attacks are still observed. Read more
[INFOSECURITY-MAGAZINE.COM]
FEDERAL, STATE & LOCAL TECHNOLOGY
BIG DATA MINING: Data Fusion Heralds City Attractiveness Ranking. The ability of any city to attract visitors is an important metric for town planners, businesses based on tourism, traffic planners, residents, and so on. And there are increasingly varied ways of measuring this thanks to the growing volumes of city-related data generated by with social media, and location-based data. Read more
[TECHNOLOGYREVIEW.COM]
HEADQUARTERS SEARCH: Why One Silicon Valley City Said “No” to Google. The most interesting part of Google’s proposed new headquarters is not the open-air layout, the glass canopies or the wild renderings — it’s how the company had hoped to convince Mountain View to approve the project. Read more
[NEXTCITY.COM]
SPENDING PROJECTION: State IT Budgets Show Big Resurgence In 2015. State IT budgets have collectively increased by $4 billion, or about 16 percent, in fiscal year 2015 compared to last year’s figures, as state revenues and overall budgets continue to strengthen, according to a new report from Deltek. Read more
[STATESCOOP.COM]
FOR THE CTO, CIO & CISO
MANAGEMENT ADVICE: The Implications Of An Increasingly Digital C-Suite. A few months back, Catherine Walsh wrote a post on how to convince the C-Suite, think CFO, CEO, etc., that social media marketing matters. Explaining that it’ll help you better reach your target market, deal with crisis management, and will help immensely to make your brand real are all important to one of the most important aspects of pitching social media: making ROI tangible. Read more
[ALLEYWATCH.COM]
DATA PROTECTION: Free, Cheap And Easy Security Tools. When it comes to detecting, preventing and analyzing information security threats, security teams need all the help they can get. Cyber attackers were able to compromise organizations within minutes in 60% of the data breach cases studied in Verizon Enterprise Solutions’ Data Breach Investigations Report 2015. Read more
[CSOONLINE.COM]
MARKETING RESEARCH: Digital Marketers Face A Suite Challenge. Marketers lean on their enterprise marketing software suites to deliver on lofty promises: cross-channel campaign management, analytics, automation, personalization, customer journey mapping, testing and optimization, customer insights and the list goes on. Read more
[CIO.COM]
==========
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.
==========