THREAT INTELLIGENCE: Enterprises are Analyzing Lots of Internal Cybersecurity Data. The cybersecurity industry has been talking about the intersection of big data and cybersecurity analytics for years, but is this actually a reality or nothing more than marketing hype? The recently published ESG research report titled, Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices, only reinforces my belief that big data security is tangible today… Read more

BEST PRACTICES: Closing The Gap Between Security & Networking Ops. IT networking operations and security operations centers are often misaligned. According to Gartner, Security is seen more as a bolt-on appendage to IT rather than an integral component that should be baked into all architectures. This leads to end-user frustration and fosters kingdom-building versus deep integration between teams. Read more

NETWORK SECURITY: VMware Rolls Out Service To Support Windows 10. The technology world is buzzing about Windows 10 — and VMware is putting its full force behind the new operating system. The VMware Workspace Suite aims to make it easier for enterprises to manage the new version of Microsoft Relevant Products/Services’s flagship software. Read more

CHANGE MANAGEMENT: How To Leverage Networks To Boost Security. The breach at the Office of Personnel Management has put security top of mind for nearly every government IT manager. Many agencies are already practicing excellent cyber hygiene; others are still in implementation phases. Regardless of where you are in the process, it is critical to understand that security is not a one-product solution, and it requires constant attention. Read more


CRITICAL PLANNING: Systems Are Changing And Business Continuity Must Keep Up. Today, IT systems are at the center of the successful operation of many business processes. As we move into higher levels of automation, data collection through the IoT and more use of compute power than we’ve yet to even image, the importance of our systems becomes critical to revenue generation and cost control. This is true across every business. Read more

FILL IN THE GAPS:: Business Continuity, Disaster Recovery and Data Centers. To mitigate a wide range of business risks, including those involving data centers, many organizations establish business-continuity (BC) or disaster-recovery (DR) plans. Fewer, however, write plans that focus on specific threats, keep those plans current or even test them. To ensure success, companies need to do better. Working with the right advanced data center is one way to fill those gaps. Read more

AVOID COMPLACENCY: Time Matters When It Comes to Disaster Recovery. Disasters can strike at any time. They may be caused by human error, cyber-attacks or by natural disasters such as earthquakes, fires, floods and hurricanes. Even so it’s quite tempting to sit back and relax, to not worry about the consequences of these upon one’s business — perhaps for cost reasons, but investments in business continuity are like an insurance policy. Read more

VIRTUALIZATION: Disaster Recovery Is Not Dead Yet. One doesn’t need to look very far to find hypervisor vendor marketing materials, analyst opinions and even a few trade press articles declaring the death of disaster recovery planning. Most are following a line of reasoning from the server virtualization evangelists to make the case that building server hosts with high availability (HA) in mind — using active-passive failover clustering models, for example — obviates the need for disaster recovery planning. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – September 24, 2015

Leave a Reply