SHADOW IT: How to Tame Unauthorised Apps and Services in Your Business. Shadow IT, or the use of outside tech tools and systems without official approval, is a major problem in the enterprise. Here’s what its growth means for your IT department. Read more

A RISING CONCERN: Shadow BYOD In Government Agencies. It is the so-called shadow IT ecosystem –the unauthorized applications that employees download and use at work without formal agency permission. That poses serious security headaches for network administrators, who don’t know which applications are out there and who has them, and therefore find it impossible to write effective security policies. Read more

EXPERT ADVICE: Incident Response Plans Key in Enterprise Cybersecurity Mgmt. Mike Denning, vice president of global security at Verizon‘s enterprise solutions unit, and Ed Powers, national managing principal of Deloitte‘s cyber risk services practice, have said organizations need to consider technical and business factors when they plan for response to security incidents. Read more

CLOUD AND VIRTUALIZATION: Anticipating VMworld. It’s the end of the summer of 2015 – the nights are getting cooler, the leaves are starting to change colors, and flocks of students are abandoning the beaches of Cape Cod bound for college campuses. The seasonal change also signals another annual ritual – VMworld in San Francisco. Read more


TECHNOLOGY TAXES: States Eye Taxes on Streaming Video and Cloud Computing. With sales of DVDs, videogames and traditional packaged software slumping for years, more state and local governments are eyeing technologies, such as streaming video subscriptions and cloud computing, to help make up for hundreds of millions of dollars or more in lost revenue. Read more

AUDIT: California Agencies Vulnerable to IT Security Breach. Many California state agencies are not complying with the state’s information technology standards, leaving them vulnerable to a major security breach of sensitive data such as Social Security numbers, health information or tax returns, the state auditor reported recently. Read more

JOINT STUDY: Many State Financial Agencies Struggle to Go Digital. Many state financial agencies say they are having a tough time transitioning to the digital revolution, citing a culture that often impedes innovation and collaboration and purchasing rules that make it tough to adapt to technological changes. Read more

SOUTH CAROLINA: Officials Canvassing Ashley Madison Data For Government Email Addresses. State officials have begun canvassing data from the Ashley Madison computer breach in search of email addresses belonging to state government employees. But State Inspector General Patrick Maley says it is too early to say what will happen next. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – October 23, 2015

Leave a Reply