Thanks to all our Veterans! We appreciate all your hard work and the sacrifices you have made for our country. Happy Veterans Day!
POST OFFICE HACK: Postal Service Discloses Major Theft of Its Employees’ Personal Data. The Postal Service on Monday became the latest government agency to announce a major theft of data from its computer systems, telling its roughly 800,000 employees and retirees that an attack “potentially compromised” databases containing postal employees’ names, birth dates, addresses and Social Security numbers. Read more
FEDRAMP: The FedRamp Security Assessment Test Case Workbook has been updated to reflect significant changes to baseline control descriptions, enhancements and associated test procedures accordingly to NIST SP 800-53 Revision 4. Read more
MICROSOFT: Releases Docker container engine for its Azure platform. One highlight of this release is that Docker 1.3 beefs up the security for virtual containers. Read more
E-GOVERNMENT: Let Congress use open source, say transparency groups. Noting a push toward open source software adoption by the executive branch, it is suggested that the legislative branch should follow suit and allow open source code to be used and published, say recommendations (pdf) issued to the 114th Congress by the Citizens for Responsibility and Ethics in Washington, the Sunlight Foundation and the OpenGov Foundation. Read more
FROM THE BLUE MOUNTAIN DATA SYSTEMS BLOG
DATA LEAKAGE: “Breaking Bad: The Risk of Unsecure File Sharing,” a report released by the Ponemon Institute, identifies key issues surrounding data leakage and the repercussions at hand. More than 1,000 IT professionals were surveyed in the United States, United Kingdom and Germany. The majority of respondents are at the supervisor level or above with expertise and understanding of their organization’s use of file-sharing solutions and overall information security and data privacy policies and strategies. Read more
TAKE IT TO THE CLOUD: “Moving to the cloud” seems to be the phrase that is part of every technology-related conversation nowadays. You can’t escape it—it’s everywhere. The private sector has jumped on board. What does that mean for public sector agencies? Read more
GAMIFICATION: How to Use Gamification for Network Security. In a recent CIO article, Lamont Wood interviews top security executives regarding the gamification campaigns at their prospective businesses. Companies such as Salesforce and SANS Institute believe that game-like elements can be used to enhance security awareness and modify users’ behaviors. Read more
GSA OPEN OFFICE: After-Hours Inspection Finds Security Issues at GSA’s Open Office. A recent after-hours inspection, however, revealed that there are some serious security breaches as a result of the open office format. Read more
APPLICATION DEVELOPMENT: Blue Mountain is dedicated to Applications and Systems Integration, Document Management and the Automation of Workflow Processes. Call us at 703-502-3416.