ANDROID SECURITY: Google Kills Remote Hacker Bug, Patches Seven Critical Flaws. Google has fixed seven critical security vulnerabilities in its February Android update for Nexus devices. Read more

ORACLE: Oracle Releases a Record 248 Security Patches for Multiple Products: Security news IT leaders need to know. Read more


CIO: Why Change Initiatives Fail. Creating the right conditions for successful change requires putting people before things. Many companies want to change and transform (especially when facing digital disruption from competitors). Yet a majority of change efforts fail – one famous and oft-cited study pegged the rate of failure at 70%. Read more

CTO: Maker Movement at Center of HHS’ Innovative Strategy. Like the emergence of open health data movement, CTO Susannah Fox sees the maker and inventor movements as the future of innovation around health care at HHS. .Read more

CISO: Survey Roundup: Feeling Better With a CISO. A survey of around 200 security analysts by ThreatTrack Security found, for those organizations that have a chief information security officer, 23% said it’s become easier to defend against malware-based cyberattacks in the past year versus 15% of respondents from companies without a CISO who said that. Ninety-four percent of those at a company with a CISO said they also have a dedicated incident response team, compared with 48% for those at a business without a CISO. And 71% at CISO companies said they would personally guarantee the safety of customer data in 2016, versus 42% of those at a non-CISO firm who would make that promise. Read more


HACKING: Federal Government Confirms That It Still Sucks at Cyber Security. A $6 billion security system intended to keep hackers out of computers belonging to federal agencies isn’t living up to expectations, an audit by the Government Accountability Office has found. Read more

BANKING: FDIC Warns Banks To Beef Up Cyber Security. Due to the increase in number and sophistication of cyber threats, cyber security has become a critical issue facing the financial services sector. The cyber threat landscape and how financial institutions’ information security programs can be enhanced to address evolving cyber security risks. Learn more about the actions taken by the federal banking agencies in response to the increase in cyber threats. Read more

OPINION: Enterprise CIOs, Think It’s OK to Ignore SMB Security Holes? The CIOs, IT Directors and CISOs for large companies have enough to worry about without having to take on the mountains of security holes infesting small- and medium-sized businesses around the globe. But a new report shows a direct connection between SMB security flaws and those of their Fortune 1000 neighbors . Read more


SIGN ON FOR IT SECURITY SUPPORT FROM BLUE MOUNTAIN DATA SYSTEMS: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain Data has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS = EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2016


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – February 19, 2016

Leave a Reply