network-securityNETWORK SECURITY

VERIFICATION: Yahoo Aims To Make Passwords Extinct. If you own a Yahoo e-mail account, you can forget your password. Literally. The search engine announced recently that it has started letting e-mail users in the U.S. change the security Relevant Products/Services settings on their accounts so they can opt in to a new verification procedure. Read more

NETWORK MANAGEMENT: Top 5 New Strategies To Improve Network Security. The most effective organizations are often the most informed about their industry, markets and internal workings. The more they know their competitors, proactively approach new demands and better manage their people, the better they can fine tune their business approach and deliver exceptional outputs. Read more


MICROSOFT: 5 Things You Need To Know About Windows 10. With the upcoming release of Windows 10, Microsoft looks to rebound from the lukewarm reaction to Windows 8. Here are five things CIOs and other IT leaders should know about the next version of the OS. Read more [CIO.COM]

PARTNERSHIPS: How Can HR Partner More Effectively With The C-Suite? The strategic role of HR is a topic that’s rarely off the agenda. Recent research from Cirrus and Ipsos MORI provides some insights into what the C-suite wants from HR leaders – as well as highlighting the views of HR leaders on where they can add most value. Read more

STRATEGIC CYBERSECURITY: What’s Behind the C-Suite Disconnect on Risk. Cybersecurity is a priority for enterprise executives and their boards, but a serious disconnect also exists in the C-suite on what the risk priorities should be and why, according to recent research. Read more

CRISIS STUDY: Crisis Expectations Are Driving A New Breed of C-Suite Leaders. In times of crisis, opinion elites want corporate leaders who are accountable, honest and can deliver on promises. And surprisingly, they are putting less weight on desiring leaders with previous experience handling crises. Read more


JUSTICE DEPT NEWS: At Odds with Google, U.S. Seeks New Computer Access Rule. The Justice Department is at odds with Google and privacy groups over the government’s push to make it easier to locate and hack into computers in criminal investigations, a simmering conflict with constitutional and policy implications. Read more

THE HILL: Broadcasters Want FCC Enforcement Changes For Ad Disclosure Rules. The Federal Communications Commission should change how it enforces rules requiring broadcasters to post ad buy information online, the National Association of Broadcasters (NAB). A 2012 rule forced television broadcasters to post information to an online FCC database detailing the size of ad buys and the name of the person, campaign or group who sponsored it, among other information. Read more

TEXAS: IT Contractors Face No Oversight, Investigation Says. Texas information technology contractors face little or no oversight, despite the fact that those same contractors received $580 million in the last four years alone, according to an investigation by the Austin American-Statesman. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – April 22, 2015

Leave a Reply