cio-stepsFOR THE CTO, CIO & CISO

GOVERNANCE: Don’t Go ‘George Orwell’s 1984’ With Big Data. The term governance comes across as boring and maybe even a bit oppressive, not unlike how many people think of actual governments – especially the dystopian regimes where citizens are stifled by excessive laws and overzealous enforcement of all those rules. Some data-driven organizations indeed cling to heavy-handed IT policies that harken the regimented Big Brother–style oversight George Orwell wrote about in his famous novel, 1984. Read more

PROCESS MANAGEMENT: Why Red Hat is tackling BPM. In today’s business environment, as enterprises seek to do more work with limited resources, orchestrating and planning daily business operations to optimize resources can be a big challenge. This environment is putting new pressure on developers and IT, according to a Forrester Consulting survey commissioned by Red Hat. Read more

WHITEPAPER: Web Application Firewalls Are Worth the Investment for Enterprises. Firewalls don’t provide sufficient protection for most public-facing websites or Web applications. Learn how Web App Firewalls help security leaders better protect data and apps in their organizations. Read more


THREAT REPORT: Attackers Focus on Vulnerability Exploits in 2H 2014 – Report. Premium-rate mobile malware, ransomware and Facebook-targeted malware caused chaos in the second half of 2014, according to the latest F-Secure Threat Report. The Finnish security company’s biannual report highlighted some key emerging attack trends for the last six months of the year, including social media-targeted malware like Kilim. Read more

RSA 2015: Cyber-Security Professionals Identify Cyber-Criminals As Biggest Threat. The majority of threat actors attacking organisations are cyber criminals. That’s the surprising view of hundreds of cybersecurity professionals who completed a landmark survey for ISACA and RSA Conference. Read more


USGS-LED STUDY: Smartphones Can Create Crowdsourced Earthquake Warning Systems. Despite being less accurate than scientific-grade equipment, sensors in smartphones and other personal electronic devices still could be used to build early earthquake warning systems, according to a new study led by U.S. Geological Survey scientists. Read more

CALIFORNIA: Drone Pros And Cons Debated At Cal State Long Beach. Drones are flying to a neighborhood near you. More than a million small, recreational Unmanned Aerial Vehicles already in circulation in the United States, according to Michael E. Drobac, executive director of the Small UAV Coalition, which pushes for the advancement of drones for commercial, recreational and public use. Read more

ENERGY TECHNOLOGY: America’s New And Improved Energy Mix. Not too long ago, America was governed by an either/or energy market. Back in the 1970s and early 1980s, the rise and subsequent demise of solar energy as a viable energy alternative was directly related to the jump and collapse in crude prices before and after the OPEC oil embargo. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – June 16, 2015

Leave a Reply