FOR THE CTO, CIO & CISO
WHITEPAPER DOWNLOAD: Total Software Management – Turning Compliance into an Opportunity. Do you want to drive more value from your software assets? Just stop looking at it like a compliance task and more like a strategic opportunity–to save some money. This Knowledge Vault, sponsored by CDW, is your one-stop resource center for designing a winning software management strategy with quantifiable bottom-line savings. Read more
[RESOURCES.INFOWORLD.COM]
IT STRATEGY: Four Tips For Kickstarting Your Innovation Story. Innovation has become a bit of a business buzzword. Every CEO and CIO worth their salt wants to be seen to be on the forefront, bringing new products and services to a market. However, it doesn’t always go to plan, and rushing in to things head first without the proper due diligence can land a company in hot water. Read more
[INFORMATION-AGE.COM]
WORKPLACE NAVIGATION: How To Deliver Performance Feedback That Sticks. Have you heard of the feedback sandwich? It’s when you start with something positive, share what needs to change, and finish with something positive. The concept has been around a long time. From what I gather, the foundation of it is sound. Read more
[CIO.COM]
DATA PROTECTION: 6 Hard Truths Security Pros Must Learn To Live With. Nearly every company in the world has thousands of vulnerabilities that hackers can easily exploit. For anyone working in IT, this is not a bombshell announcement. It’s business as usual. Read more
[CSOONLINE.COM]
INFORMATION SECURITY
HITB HAXPO: Richard Thieme’s Call To InfoSec Community To ‘Think Beyond The Edges’. The former priest gone author and futuristic technology guru is well known within the InfoSec community and considered a “father figure” of the hacking convention circuit, keynoting at events such as DefCon and BlackHat. Read more
[IDIGITALTIMES.COM]
TAGGING POLICIES: The Challenges Of Data Classification. We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. From information gateways, websites, file shares, and web applications, to instant messaging and on-premises and cloud collaboration systems, data is free-flowing both within and outside an organization’s walls. Read more
[NET-SECURITY.COM]
SPEAR PHISHING: Most People Can’t Spot an Email Scam Plenty of folks think they could never be outsmarted by a hacker; plenty of them are wrong. In fact, perhaps 97% are wrong. Two new studies make this point, and show the devastating consequences of being wrong. Read more
[TIME.COM]
WEAPONIZING CODE: America’s Quest To Control The Exploit Market. When the US Bureau of Industry and Security published how it plans to implement the sections on hacking technologies in a global weapons trade pact called the Wassenaar Arrangement (WA) last week, it ignited an online firestorm of meltdowns, freakouts, and vicious infighting within the most respected circles of hacking and computer security. Read more
[ENGADGET.COM]
==========
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.
==========