cybersecurity-warningsCYBERSECURITY

WARNING: Beware of the Affordable Care Act phishing scam. US-CERT is warning consumers about a phishing scam making rounds online pretending to be from an official federal agency. The emails claim to have important information on the Affordable Care Act and the recipient’s health insurance coverage. When a person clicks through, the sites ask for personal information, install malware on the user’s device, or both. Read more
[FEDERALTIMES.COM]

ANDROID: How to avoid WebView trouble on older Android devices. Google has stopped providing pre-KitKat patches for Android’s built-in Web browser, but that doesn’t mean you’re left wide open to attacks. Read more
[ZDNET.COM]

PROJECT ZERO: After criticism from Microsoft, Google reveals more Windows security problems. Early this week, Microsoft was publicly displeased with Google for revealing a Windows security hole that would allow hackers to gain control of computer systems. Now Google’s Project Zero disclosed two more Microsoft bugs. That makes at least four disclosures against Microsoft in the last few weeks. Read more
[MASHABLE.COM]

DISA: What do DISA’s new cloud security requirements mean for classified information? The Defense Information Systems Agency released updated cloud security requirements this week, consolidating six previous “impact levels” of information sensitivity into four in an effort to simplify the process for cloud providers and the Defense Department alike. That follows recent moves by DISA to speed up the pace at which DOD customers can explore opportunities in the cloud. A rewritten cloud strategy released last month by DOD Acting Chief Information Officer Terry Halvorsen eliminated DISA’s previous role as a cloud service broker, while retaining its role in ensuring information security in the cloud. Read more
[NEXTGOV.COM]

FOR THE CTO, CIO & CISO

CIO: Workers bringing own mobile devices compel CIOs to embrace cloud. The CIO’s role is changing quickly in a world where the spread of mobile devices and Internet-based programs is resulting in a more employee-led approach to new technology. Companies’ top information-technology executives now must track the use of workers’ own devices and applications and decide which of these programs to roll out companywide. That’s a break from the past, when they had more control over evaluating what software and hardware to buy before it reached the staff. Read more
[CHICAGOTRIBUNE.COM]

CISO ADVICE: The world’s first CISO explains why technology alone has never beaten cyber crime. After 30 years heading information security for many of the world’s biggest financial institutions, Steve Katz believes the primary skill of a security chief is communication. Read more
[INFORMATION-AGE.COM]

CTO MANIFESTO: It is not an overstatement to say that the role of the CTO is more important today than ever, both in private enterprise and in government. This is because technology is defining our future, and is absolutely essential to the functions and operations of every organization. While the CTO’s job description and responsibilities vary depending on the organization, there are some important common denominators. Read more
[FCW.COM]

FEDERAL GOVERNMENT

NIH: NIH Commits $1M For Big Data Educational Grants . The National Institutes of Health announced this week that it is seeking applications for new educational grants to fund curriculum design projects and research experiences that will teach the use of “big data” research in the biomedical sciences. Read more
[GENOMEWEB.COM]

WISH LIST: It’s been more than four months since federal Chief Information Officer Steven VanRoekel walked off the job and into a new role using technology to fight the Ebola outbreak in West Africa. It’s still anybody’s guess whom the administration will name to fill VanRoekel’s shoes. Regardless, agency officials and tech implementers are sharing some items they think should be at the top of the yet-unknown federal CIO’s to-do list. Read more
[NEXTGOV.COM]

DEPT OF ENERGY: Energy Department releases energy sector cybersecurity framework. Energy companies and utilities should develop risk management strategies and incorporate cyber best practices into their security procedures, according to voluntary guidance released by the Energy Department Jan. 8. Read more
[FEDERALTIMES.COM]

APPLICATION DEVELOPMENT

WINDOWS 10: 3 things Microsoft needs to prove at its Windows 10 event. If people are to believe Windows can capture the spirit of the mobile era, Microsoft will have to make a watertight case. Will Windows remain relevant? In a world of choices, would you willingly choose Windows 10? And in a business where others make these choices for you, would they choose Windows 10? Read more
[COMPUTERWORLD.COM]

GOOGLE: Android loses share in operating system market. There was movement in the smartphone market in the months following Apple Inc.’s September release of the iPhone 6 and iPhone 6 Plus—Android’s share of the operating system market fell for the first time since 2013. Read more
[MARKETWATCH.COM]

PERSONAL TECH

WINDOWS 7: A pop-up alert you probably don’t want to eliminate. If you are getting a security alert pop-up that says, “The identity of this website or integrity of this connection cannot be verified,” it means that the site you’re visiting does not have a legitimate security certificate. What if you are getting this message for every site you visit? Here’s the solution. Read more
[SEATTLETIMES.COM]

==========

APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.

==========

FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – January 20, 2015

Leave a Reply