Cloud computing Blue Mountain Data SystemsCLOUD

CLOUD BUG BOUNTY: Microsoft has launched a cloud bug bounty starting with Office 365. Vulnerability types include Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), Unauthorized cross-tenant data tampering or access (for multi-tenant services), Insecure direct object references, Injection Flaws, Authentication Flaws, Server-side Code Execution, Privilege Escalation and Significant Security Misconfiguration. Get the Details

INFOGRAPHIC: Infographic: Up in the Air? The Future of Cloud Computing. View It

CLOUD COMPUTING: Red Hat CEO announces a shift from client-server to cloud computing. In other words, Red Hat is moving from Linux to OpenStack as its primary breadwinner. Read more


TECH CULTURE: A new report called “The Digital Dividend: First Mover Advantage” from the Harvard Business Review and Verizon, details how technology adoption is changing the business of government. Much like the private sector, government organizations can be classified by their willingness to integrate new technologies, and the first movers are winning. Read more

CITIZEN ENGAGEMENT: The Rule of Three. Do you believe that the involvement of citizens in the management of the government makes government better? Are you willing to do things differently to reach a different segment of the population? Read more


UTAH: Utah senator to propose teaching coding in schools. Sen. Howard Stephenson, a Republican from Draper, Utah, is proposing legislation that will make computer coding accessible to all students as early as elementary school in an effort to push them towards high-paying jobs in the technology sector. Read more

CALIFORNIA: Did you know the state of California employs 130 CIOs and more than 10,000 IT professionals and spends $3 billion annually on technology? Check out their Tech Blog. Read more


SECURE DOCUMENTS: 18 Ways to Secure Your Electronic Documents. Are your organization’s document management security inefficiencies leaving you open to legal and economic repercussions? Find out how to keep your electronic files secure during the entire chain of custody. Read more

ID THEFT: Poor document management fuels ID theft. Organizations that fail to effectively dispose of documents containing personal details of customers and employees are placing these stakeholders at an increased risk of identity theft. Read more


ELECTRONIC DOCUMENT MANAGEMENT: Blue Mountain Data Systems processes over 2.75M case-related documents per year for The U.S. Department of Labor. Call Paul at 703-502-3416 to discuss how we can help you create the electronic records management system you really need.


Federal & State CTOs CIOs CISOs: Daily Tech Update – September 25, 2014

Leave a Reply