FOR THE CTO, CIO & CISO
BUSINESS CONTINUITY: How To Create An Effective Data Security Communication Plan. In today’s global office, IT security leadership spends a great deal of time and resources creating a defense-in-depth approach to data security. This often includes layering on both logical and physical solutions as well as detailing out policies and procedures for accessing company data in a secure manner. Read more
[CSOONLINE.COM]
PLANNING: CIOs Name Their Top 5 Strategic Priorities. After breaking up into a number of task forces and discussing strategic priorities, CIOs at the Journal’s CIO Network event came together to create a prioritized set of recommendations to drive business and policy in the coming year. Read more
[BLOGS.WSJ.COM]
CONFERENCE: March 31 – April 1, 2015, Amelia Island, Florida. AGENDA is the all-new business leadership conference focused on transforming business for the digital world. Business today not only demands a mobile, social and omni-channel experience for customers and employees alike. It requires that organizations harness these outlets for business growth in new and innovative ways at an ever faster pace as business cycles collapse and competitors sprout up ever faster. Read more
[AGENDACONFERENCE.COM]
MULTIFACTOR AUTHENTICATION
FORECAST: Multi-Factor Authentication Market Will Be Worth US$1.6 Billion By The End Of 2015. Username and passwords have been widely used to authenticate user identity but fail to provide adequate authentication. Authentication-based attacks continue to plague organizations of all sizes with the majority of breaches being attributed to weak or absent authentication. Read more
[NET-SECURITY.ORG]
SECURITY: The Top Multifactor Authentication Products. Multifactor authentication can be a critical component of an enterprise security strategy. Here’s a look at the top MFA products in the industry. Find out more
[TECHTARGET.COM]
ONLINE SERVICES: Here’s Why Your Bank Account Is Less Secure Than Your Gmail. Despite being accepted as a simple but effective method of protecting online accounts, several major banks don’t use two-factor authentication to prevent unauthorized logins to your account. Why not? Find out more
[GIZMODO.COM]
==========
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.
==========