ENCRYPTION

MOBILE: 7 Reasons Mobile Payments Still Aren’t Mainstream. Though mobile payments and wallets are increasingly popular, they’re still nowhere near mainstream. A set of experts and finance-industry watchers weigh in on what’s holding mobile payments back, as well what will need to happen for the systems to hit the big time. Read more
[CIO.COM]

GOVERNMENT AGENCIES: Protecting Data Means Balancing Security vs. Convenience. Most people use encryption every day, unaware that their phones and Internet browsers invisibly translate their data as it moves from point to point on the internet or that their mobile apps use the technology to obscure their data in the cloud. Yet many government agencies are still struggling to deploy encryption across all their systems.Only 44 percent of non-defense Federal web sites employ the secure HTTPS Internet protocol, according to pulse.cio.gov, a government transparency project of the General Services Administration (GSA). Read the rest
[GOVTECHWORKS.COM]

ANDROID: Android Patch: Samsung Fixes Galaxy Flaw That Lets Crooks into Stolen Phones. Samsung has issued a patch to shut down a bypass for ‘factory reset protection’, which is meant to stop thieves from setting up a stolen device. Find out more
[ZDNET.COM]

CLOUD: Microsegmentation & The Need For An Intelligent Attack Surface. There is a fundamental difference in the security posture and technology for protecting the White House versus a Social Security office in California. So, too, for the critical apps and systems that are likely targets in your enterprise. Read more
[DARKREADING.COM]

==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems May 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-may-2016.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Encryption – Daily Tech Update – June 21, 2016

Leave a Reply