READ: The Rise Of Open-Source Malware And IoT Security. With 2017 well underway, security professionals are scrambling to understand emerging cyberthreats that will be prevalent in the coming year, and the appropriate mitigation techniques. I’ve found that this is particularly true for communications service providers (CSPs), who have to protect their networks as well as business and consumer subscribers from attacks. While ransomware, data breaches and global hacking events will continue to grab headlines, a major area of focus in the cybersecurity world in 2017 will undoubtedly be internet of things (IoT) devices. Based on recent attacks, these devices seem easy to hack, and can be used to launch global attacks with devastating outcomes. Find out more
CLONES: Welcome in Scientific Hardware. Learn why a firm is open sourcing their testing equipment. Find out more
MICROSOFT: To Shut CodePlex Open Source Project Site. The company acknowledges that GitHub is the go-to option for project hosting and will shutter CodePlex at the end of this year. Find out more
GIS: Unlocking Business Value with Open Source GIS. Proprietary geospatial software generally consists of subscriptions that determine how many data sources can be considered and how much it will cost to determine optimal routing. Open-source geospatial software, on the other hand, allows organizations to leverage geospatial data without incurring per-user, per-login or per-CPU cycle costs. Additionally, users are not penalized for increasing their number of users or conducting as much analysis as is required to determine ideal routing. Here’s a look at the most prominent benefits of open-source software. Find out more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems March 2017 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-march-2017.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.