NEW ONLINE SECURITY RESEARCH: The Ad Injection Economy. In March, we outlined the problems with unwanted ad injectors, a common symptom of unwanted software. Ad injectors are programs that insert new ads, or replace existing ones, into the pages you visit while browsing the web. We’ve received more than 100,000 user complaints about them in Chrome since the beginning of 2015—more than any other issue. Unwanted ad injectors are not only annoying, they can pose serious security risks to users as well. Read more

SOCIAL ENGINEERING DEFENSES: Reducing The Human Element. While often viewed as the best defense against social engineering, security awareness training is ineffective and expensive. This topic has been hotly debated by security conference panels, and in various articles, but the focus has usually been on conducting or improving awareness training. Read more

FRAUD SUMMIT: Managing Fraud Investigations. Ridgway, assistant U.S. attorney and deputy chief of the National Security and Cybercrimes division within the Department of Justice, says that while many breached entities would prefer to wait until they have completed an internal investigation before sharing information with law enforcement officials, it’s better to notify authorities early on to help preserve evidence. Read more

MALWARE ALERT: New Infostealer Tries To Foil Analysis Attempts By Wiping Hard Drive. Cisco researchers have discovered a new information-stealing Trojan that reads and records any plain-text data the victim types into their browser. But this discovery would be nothing to write home about were it not for the malware’s extremely destructive behavior if it detects malware researchers’ attempts to analyze it. Read more


SECURITY LEADERSHIP: Relocation Costs Now A Sticking Point For Job-Hunting Security Managers. In an effort to cut costs, many companies hire local candidates to fill CSO positions. But are they also sacrificing quality for their security program? Read more

SOCIAL MEDIA NEWS: Why Your Business Needs A Pinterest Presence. Sure, you know your company needs to be on Facebook and Twitter. Maybe you want to be on Instagram to share photos and LinkedIn to find employees. But what about Pinterest? If your company has a story to tell — one that can be told visually — there’s a Pinterest audience on the site for you. Find out more

EMPLOYEE LIFECYCLE: Optimizing Talent Management With Digital Services. As technology continues to rapidly develop the modern workplace, we are seeing how technology and digital services are playing a crucial part in all aspects of the employee lifecycle, whilst also serving wider business objectives. Read more

HIRING STRATEGIES: CIOs Reveal Top Concerns, Retention Not Getting Its Due. Worries about information and systems security continue to keep most CIOs up at night, and in fact, security is the number one concern among CIOs and CTOs. But many aren’t placing proper priority on IT retention efforts, considering the growing skills gap in the market. Find out more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – July 1, 2015

Leave a Reply