VULNERABILITIES & THREATS
INTERACTIVE TESTING PRODUCTS: Software Security Is Hard But Not impossible. There’s little debate about the danger posed by software security vulnerabilities, but there is healthy dialogue around how organizations can respond. The application security market as we know it has existed for about 15 years, emerging alongside interactive web applications and hackers who quickly identified those systems as easy targets. Read more
[DARKREADING.COM]
PRIVACY SURVEY: Federal IT Pros Challenged By The Explosion Of Mobile Devices, Growth Of Shadow IT. Federal information technology professionals lack control and confidence in their ability to mange the risks associate with the growth of mobile devices and shadow IT, finds a recent survey. Read more
[FIERCEMOBILEGOVERNMENT.COM]
WHITEPAPER: An Executive Business Case for Network Security. Security is an important topic for all levels of management. This document provides the C-level with a comprehensive guide to lowering security costs while also increasing company ROI. You will learn the true costs of investing and NOT investing in a resilient defense to shield your company from growing threats. Read more
[DATABREACHTODAY.COM]
IG VERDICT: Department of the Interior Has 3,000 Vulnerabilities. At a hearing on the role the Interior Department played in a recent breach at the Office of Personnel Management, the Interior deputy inspector general painted a picture of how a hacker might have breached the agency’s computer system. Read more
[SILICONREPUBLIC.COM]
MOBILE TECHNOLOGY
REVENUE PREDICTIONS: 84% Of Execs Say They Will Meet Or Beat Targets With Mobile Technology. The KPMG Technology Industry Outlook Survey, A Tale of Two Disruptions: Tech Innovation and Cybersecurity brought forth this prediction. KPMG completed surveys with 111 tech industry leaders in the United States during March & April, 2015. Respondents are from a mix of public and private companies, ranging in size from $100M to more than $1B. Read more
[FORBES.COM]
GOOGLE PROJECT FI: Little Things Mean Big Changes In Mobile Services; For The Better. Lost in the alphabet soup that is Google’s new holding company is one of its many experiments in changing the business rules for network services while nudging the technology in a direction that ultimately benefits consumers. No, not Fiber, although it’s a fantastic broadband disruptor for those that can get it, but Project Fi, Google’s mobile service. Read more
[FORBES.COM]
GOOD TECH STRATEGY: Enterprises Adopt Various Mobile Apps for Secure Data Access. A new report by Good Technology says 67 percent of enterprises are increasing the usage of different mobile applications to secure corporate data. GT’s Mobility Index Report has found that custom apps, secure browser, document access, instant messaging and document editing are the top app categories among corporate organizations. Read more
[EXECUTIVEBIZ.COM]
MOBILE SECURITY STRATEGY: Look Beyond the Device. When we think of mobile security, the first thought that pops into our heads is securing the device and the content on the device. While this approach has worked well for many companies in the mobile security space, it covers only 20 percent of the threat. To understand why we need to look beyond just securing the device, we must understand how a mobile device gets compromised. Read more
[SECURITYINTELLIGENCE.COM]
==========
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.
==========