AGILE SECURITY: How Policy Can Enhance, Rather Than Hinder, Breach Detection. With the recent attacks on U.S. organizations in the commercial and public sectors, many companies have asserted they have done everything in their power to prevent further incidents. Most of these claims are tied to adherence to regulatory compliance. In theory, security policies put standards in place to protect organizations, stakeholders, and users. But in practice, security policy often becomes a distraction, forcing organizations to focus on satisfying the demands of a governing body or an auditor, rather than addressing real threats. Behaviorally, organizations become more concerned with meeting these standards than protecting the business. Read more

SOFTWARE: Bimodal IT – Best Of Both Worlds For Large Enterprises. Managing two separate modes of IT delivery, one focused on stability and the other on agility, can be critical for IT success — if the company is large enough. Read more

MOBILE: Key Business and Process-related Mistakes in Mobile Application Development. How do you add staying power to an app? More precisely, when you’re developing a new app, what should you avoid? What are the common mistakes? Most app slip-ups fall into one of two categories: process-related mistakes and business-related mistakes. Read more

AGILE CLOUD: IBM Aims To Make Enterprises Agile With Cloud Data Service. IBM says its new “Open for data” slogan encompasses a slew of new cloud data services and analytics offerings designed to make it easy for enterprises to quickly get started with big data in the cloud, even if their workloads require secure on-premises implementations. Read more


CIO: How to Conquer Recruiting, Retention and IT Skills Challenges. Experts in the technology industry look at the year ahead and what it holds for recruitment and retention. They also identify what tech skills will top the charts. Read the rest

CTO: ‘Corporate’ IT Teams Can Hamper Agile Projects, Warns William Hill CTO. “Corporate” IT teams who try to use agile within their organisations without notifying other departments are more likely to hamper “agile” as a concept, than those organisations that try to carry out too many agile projects, according to Finnbar Joy, chief technology officer at William Hill. Read more

CISO: Obama Wants More Cybersecurity Funding and a Federal CISO. In the final budget of the Obama administration, the White House is looking to boost spending on security, hire more experts and partner with the private sector. Read more

GOVERNMENT CIO: Senate Passes Permanent Ban on Internet Access Taxes. The ban on taxes targeting Internet services now heads to Obama. The Permanent Internet Tax Freedom Act was included in a trade enforcement bill passed by senators in a 75-20 vote Thursday. The provision, passed by the House of Representatives last June, would permanently extend a 18-year moratorium on Internet-targeted taxes that expired in October. Congress had extended the moratorium several times since 1998, but supporters weren’t able to pass a permanent ban until now. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – February 12, 2016

Leave a Reply