SURVEY FINDINGS: ‘Golden Hour’ Incident Response Agility. Do you really need to worry about targeted attacks? This new Tackling Incident Detection and Response survey found that, depending on the size of your business, you are probably responding to one to three incidents per week. Read more [DARKREADING.COM]

DETECTION TOOLS: How IDT Corp. Automates Incident Response. Some types of cyberattacks such as those designed to knock websites offline are overt and easy to identify. But some of the most devastating attacks come with alerts that seem more like whispers. Those are the ones that Golan Ben-Oni, chief security officer at telecom and payments provider IDT Corp.IDT +0.57%, worries about. Read more

NEW OFFERINGS: Symantec Expands Incident Response Services Globally. Given the sophisticated nature of the threat landscape, organizations need to change their security strategy. Symantec has launched two Incident Response offerings to steer customers away from a high-cost reactive approach toward a more proactive, programmatic one. Read more


HOW-TO: Hit The Jackpot When Selecting Enterprise Software By Using RFP Scoring. Most enterprise software RFPs (or RFIs or RFQs) contain hundreds or thousands of requirements. When vendors respond to these RFPs, how do you deal with so many requirements? How do you take the gamble out of selecting software? Read more

USER EXPERIENCE: What Enterprise Software Users Really Want, If They Are Candid with Themselves. Perhaps it’s the fresh-faced optimism of the new-ish year, but lately, I’ve been seeing lots of instances where customers and users are telling UX designers in specific detail what it is they want out of their experience with software—and we, as UX designers, believing them. Not only do we believe them, but we are also creating experiences around what they say Read more

GOOD NEWS: Blackberry Back On Track This Year; Piggybacking On Enterprise Software Services. After almost disappearing in 2013, BlackBerry is back on track this year, thanks in large part to its enterprise software services. But the brand also strives to return to its former glory by releasing new phones, including the brand new Leap. Read more


COURT RULING: Trend Micro Wins Legal Dispute With Patent Troll. Security giant Trend Micro has dodged a potentially costly copyright infringement trial with Intellectual Ventures after a judge invalidated two key patents belonging to the firm. Judge Leonard Stark ruled at the end of last week that the patents were too abstract and not eligible for legal protection. Read more

SANS SECURITY AWARENESS: Protecting Our Youth from the Wolves of Cyberspace. The goal of the RSA Keynote panel on protecting kids online was to raise awareness of the risks kids face online today, but also just as importantly what we can do about it. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – June 18, 2015

Leave a Reply