COMPLIANCE: New PCI SSC Penetration Testing Guidelines Aim To Be More Prescriptive. In an effort to help enterprises hurdle an ongoing compliance stumbling block, the PCI Security Standards Council (SSC) has issued new supplemental guidance on penetration testing.
SECURITY STANDARDS: PCI Issues Penetration Test Guidance. New guidance from the PCI Security Standards Council specifies how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Read more
FOR THE CTO, CIO & CISO
NEW RULES: Balancing Risk Against Opportunity Is A Job For Both IT And Marketing. What do CMOs want from CIOs? Mary K. Pratt explores that question in a Computerworld article, “7 things marketing wants to say to IT.” Some of the things chief marketers want are going to set your teeth on edge. Read more
WHITEPAPER: Three Burning Questions your IT Must Answer. Most large companies have spent significant amounts of money over the last few years to restructure and update their infrastructure to keep pace with the demands of their business and major changes in technology. Read more
IT MANAGEMENT: Ten Tips on How to Get That Employee to Admit His Wrongdoing. Let’s say you’re the chief security officer in your company, and you have a trusted network administrator who comes to you and says she had left her purse in a secure area of the data center when she went to attend a meeting with a couple of managers, and when she returned. Read more
FEDERAL, STATE & LOCAL GOVERNMENT
MOBILITY: The 5 Mobile Devices Cities and Counties Prefer. When Bernard Hanzer joined the city of Richmond, Va., in 2013, the IT manager noticed that many users had tablets, notebooks, desktops and smartphones. “Everyone was saying that they had to have these four or five devices, and I wanted to understand why that was,” he says. Read more
WORKFORCE: Agencies Seek At Least $75 Million In Digital Service Funding. It’s no secret that the federal government is on the lookout for a few good geeks. The fast-growing U.S. Digital Service, housed at the Office of Management and Budget, trying to induce private-sector techies to do a stint in government. Read more
WORDPRESS: ISIS Backers Deface Websites. Sympathizers of the Islamic State terrorist group are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news organizations, businesses, religious institutions and governments in the U.S. and abroad, according to the FBI. Read more
HACKER TAKEDOWN: Cybercrime Fighting Group Wipes Out Malicious Servers. A new group of international cyber-crime-fighters has claimed one of its first kills. The group has pulled the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States. Read more
MALWARE: Bad News Everyone: Cybercrime Is Getting Even Easier. Around one in three (30 per cent) of end-users click through a malicious URL in an email even though they have been warned of the danger. “End users are increasingly desensitised from the warnings, don’t feel responsible and still lack enterprise-driven education,” according to Websense.
Find out more
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.