QUICK STEPS: Taking A Security Program From Zero To Hero. Breaking the enigma of InfoSec into smaller bites is a proven method for building up an organization’s security capabilities. Here are six steps to get you started. Read more

SOFTWARE PLATFORMS: Remotely Exploitable Vulnerabilities in SAP Compression Algorithms. The two primary compression algorithms used by SAP SE products, some of the most popular enterprise and business management software platforms on the market, contain multiple, remotely exploitable security vulnerabilities. Read more

RANSOMWARE THREAT: TeslaCrypt Used To Extort Over $76K In Recent Months. Cybercriminals have pocketed substantial payments from victims infected by TeslaCrypt, a relatively new ransomware threat known for being distributed through the Angler Exploit Kit (EK). Read more

FAST FEED: Want To Make More Money? Get A Cybersecurity Job. A new salary survey indicates that working in cybersecurity—i.e., dealing with script-deploying teenagers and pesky Chinese economic intelligence projects—pays quite well. Tripwire, a Portland-based threat detection firm that markets threat detection tools to Fortune 500 corporations, recently published a guide to top-paying jobs in information security… Read more


RELATIONAL DBS: NoSQL Database Maker MarkLogic Gets $102M VC Shot in Arm. The NoSQL market is positioned as an alternative to traditional—and most often expensive—relational databases. Read more

TRENDS: The Role of Hadoop in Advancing Data Analytics. Hadoop is contributing to the success of data analytics. Anad Rai, IT manager at Verizon Wireless, examined the differences between traditional versus big data at Data Summit 2015 in a session titled “Analytics: Traditional Versus Big Data.” Read more


CAREERS: 7 Tech Jobs That Don’t Feel Like Work. The tech industry is a booming enterprise where the experienced professional can earn enough to live a comfortable lifestyle, to put it modestly. Still, money isn’t everything, and oftentimes, those buried in the tech industry begin to wear out. Read more

PREPARATION: 10 Tips To Help College Tech Grads Enter The Workforce. Finding a new job can be a job in itself. And like any job, you want to approach it with the right tools to help ensure a successful outcome. To help you fill your proverbial toolbox, we spoke with experts in the technology job market to see what employers are looking for and how you can incorporate their advice into your career strategy. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – July 15, 2015

Leave a Reply