THREAT LANDSCAPE 2015: Mobile, IoT Face More Complex Attacks in 2015. The McAfee Labs’ “2015 Threats Predictions” report forecasts a threat landscape punctuated by more attacks exploiting long-established Internet trust standards and increased attacks on mobile devices and the IoT (Internet of things). Read more

ANDROID: Google defends policy that leaves most Android devices unpatched. Last week Google defended its decision to stop patching WebView, a core component on 60% of Android hardware, on versions older than 4.4, aka “KitKat,” saying that the huge code base is unsafe to fix. Read more


CIO: CIO and IT leaders: YOU hold the burden of proof. Disconnects between IT and business leaders are an accepted part of corporate life. Solving this problem lies first with the CIO. Read more

CTO: Infosec management strategies and the modern CTO. Lumenta CTO Brandon Hoffman offers his perspective on the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness. Read more

CISO: Don’t delegate cyber risk management responsibility. The responsibility of managing and overseeing the cyber risk in an organisation must sit at an the executive level. Read more


FAA: FAA to Airlines: E-cigs in Checked Bags are Fire Risk. As the popularity of e-cigarettes increases, the FAA wants airlines to ensure passengers don’t put their e-cigarettes in checked baggage, when they can pose a fire hazard in the cargo compartment. Read more

COMMERCE: Free Online Chat Thursday, Feb. 5, 2015, 1-1:30 p.m. (EST): Ask the CIO with Commerce’s Steve Cooper, the Commerce Department’s CIO, who discusses his IT priorities around operational excellence, enterprisewide services and infrastructure modernization. Read more

U.S. PATENT & TRADEMARK OFFICE: USPTO Leverages Big Data Tools to Comb Through Patents. Michele Lee, current acting director of the USPTO, plans to integrate big data more into the patent examination process because the agency “is a numbers-driven organization like no other organization is.” Lee also states that the office was now on “sound financial footing” and would be able to more quickly reduce the backlog of patent filings. Read more


ORACLE: ‘Highly Irregular’ Backdoor Found In Oracle Databases. Any business that runs an Oracle eBusiness Suite should look to patch their systems ASAP. That’s because there’s a nasty vulnerability that allows anyone to totally take over the database server associated with the suite. That likely means usernames, passwords and other kinds of critical data linked to financial and human resources applications are in danger. Read more

NoSQL: Big Data Projects: How to Choose NoSQL Databases. In this big data market where the NoSQL database is king, there are more than 100 different offerings available in various licensed models. The fact that these non-databases vary is no accident. Each distinct implementation has different strengths, weaknesses, and generally accepted uses. However, the bulk of these break down into four major categories based on some common underlying characteristics. Find out more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – January 26, 2015

Leave a Reply