STATE GOVERNMENT TECHNOLOGY
TECHNOLOGY TAXES: States Eye Taxes on Streaming Video and Cloud Computing. With sales of DVDs, videogames and traditional packaged software slumping for years, more state and local governments are eyeing technologies, such as streaming video subscriptions and cloud computing, to help make up for hundreds of millions of dollars or more in lost revenue. Read more
AUDIT: California Agencies Vulnerable to IT Security Breach. Many California state agencies are not complying with the state’s information technology standards, leaving them vulnerable to a major security breach of sensitive data such as Social Security numbers, health information or tax returns, the state auditor reported recently. Read more
JOINT STUDY: Many State Financial Agencies Struggle to Go Digital. Many state financial agencies say they are having a tough time transitioning to the digital revolution, citing a culture that often impedes innovation and collaboration and purchasing rules that make it tough to adapt to technological changes. Read more
SOUTH CAROLINA: Officials Canvassing Ashley Madison Data For Government Email Addresses. State officials have begun canvassing data from the Ashley Madison computer breach in search of email addresses belonging to state government employees. But State Inspector General Patrick Maley says it is too early to say what will happen next. Read more
EXPERT ADVICE: Incident Response Plans Key in Enterprise Cybersecurity Mgmt. Mike Denning, vice president of global security at Verizon‘s enterprise solutions unit, and Ed Powers, national managing principal of Deloitte‘s cyber risk services practice, have said organizations need to consider technical and business factors when they plan for response to security incidents. Read more
CLOUD AND VIRTUALIZATION: Anticipating VMworld. It’s the end of the summer of 2015 – the nights are getting cooler, the leaves are starting to change colors, and flocks of students are abandoning the beaches of Cape Cod bound for college campuses. The seasonal change also signals another annual ritual – VMworld in San Francisco. Read more
A RISING CONCERN: Shadow BYOD In Government Agencies. It is the so-called shadow IT ecosystem –the unauthorized applications that employees download and use at work without formal agency permission.
That poses serious security headaches for network administrators, who don’t know which applications are out there and who has them, and therefore find it impossible to write effective security policies. Read more
UNINSTALL FLASH: Web Browser Plugins Are Vulnerable. Adobe Flash has been in the press a lot recently after zero day vulnerabilities were disclosed. Facebook’s CISO is calling for an end of life date, and Brian Krebs, the well-known infosec journalist (along with many others), is calling for everyone to uninstall the software. Read more
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.