PRODUCTS: The 10 Coolest Network Security Products Of 2017 (So Far). Security vendors are continuing to step up their game when it comes to network security technologies as customers face an ever-rising tide of threats. The year so far has seen vendors launching new capabilities to help customers respond to the more advanced threats facing their businesses, as well as expand beyond traditional perimeter technologies. Those advancements have included capabilities around artificial intelligence, the Internet of Things, advanced threat protection, cloud security and more. While 2017 is far from over, here are 10 security offerings that have stood out so far in network security. Read more
TUTORIAL: Passive Python Network Mapping. Do you know what’s running on your networks that you don’t know about? In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing devices against network security threats. Read the rest
MAC MALWARE: Creepy FruitFly Mac Malware Spies on Its Victims. Mac users beware: Law enforcement agents are investigating malware that’s been affecting Mac computers. The malicious code appears to be purely for targeted surveillance, according to Forbes. The malware, called FruitFly, allows hackers to jump into webcams of affected computers and take screenshots. The malware also has the capability to take over the entire computer, according to CBS Sacramento. Find out more
IoT: New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities. RiskSense, Inc., the pioneer and market leader in pro-active cyber risk management, today announced it has expanded its RiskSense Attack Surface Validation capabilities beyond networks, Web applications, and databases to Internet of Things (IoT) devices and Operational Technology (OT) networks to provide a holistic view of an organization’s cyber risk exposure. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2017 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2017.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.