CYBERSECURITY
FDIC: Why the FDIC Is Updating Its Cyber Security Policy After This Data Breach. The U.S. Federal Deposit Insurance Corporation is updating cyber security policies after a 2015 data breach in which a former employee kept copies of sensitive information on how banks would handle bankruptcy. FDIC Chairman Martin Gruenberg said he made personnel changes after receiving a report in 2013 informing him that he had not been fully briefed about the major compromise of the regulator’s computers by a foreign government in 2010 and 2011. Read more
[FORTUNE.COM]
BLIND SPOTS: Cybersecurity Blind Spots: Mitigating Risks and Vulnerabilities. Technical blind spots certainly present major information security challenges to CISOs and their teams, as the complexities of monitoring encrypted traffic and updating SAP software and other legacy applications can be daunting tasks. But there are other cybersecurity blind spots that involve more amorphous and less technical concepts such as enterprise risks. Here’s how security experts overcome these challenges. Read the rest
[SEARCHSECURITY.TECHTARGET.COM]
CAREERS: Feds to Hire 3,500 Cybersecurity Pros by Year’s End. Last October, the U.S. government began hiring 6,500 new cybersecurity IT professionals. It has hired 3,000 so far, and plans to hire another 3,500 by January 2017, the White House has reported. Read more
[COMPUTERWORLD.COM]
THREAT PREVENTION: Context-Rich And Context-Aware Cybersecurity. An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats. Read the rest
[DARKREADING.COM]
==========
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
==========