SLIDESHARE: Catch up on all the Blue Mountain Data Systems Inc. Tech Updates published in March 2015.
ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – March 2, 2015
FOR THE CTO, CIO & CISO MODEST ADVICE: Life Lessons from Harper Reed and Inside His New Startup. Harper Reed, the former CTO of both the 2012 ‘Obama for America’ campaign and Threadless, is one of the most influential, accomplished,
Weak Patch Management Strategy Leads to Epic Security Failure
Patch management: It’s a thankless job, but someone has to do it. Sending out the email requesting that users leave their computers on so that updates and patches can be deployed may be met with mass dissent, but that dissent
Daily Tech Update Summary – February 27, 2015
SLIDESHARE: Catch up on all the Blue Mountain Data Systems Inc. Tech Updates published in February 2015.
ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – October 2, 2014
IT SECURITY NATIONAL CYBER SECURITY AWARENESS MONTH: Why Cyber Security Matters To Everyone. October is National Cyber Security Awareness Month — as good a time as any to remind people that their cyber security hygiene doesn’t just affect them, but
For Federal & State CTOs CIOs CISOs: Daily Tech Update – September 30, 2014
PROGRAMMING & SCRIPTING HOW TO LINK JAVA & JAVASCRIPT: JHipster links Java and JavaScript for Web development. The JHipster application generator is enabling developers to blend their Java and JavaScript development skills on the same Web applications. Read more [JAVAWORLD.COM]
Understanding Encryption
In this age of heightened awareness, organizations and agencies are super-vigilant in protecting sensitive data from falling into the hands of unauthorized sources. Encryption is one method in which this can be achieved. Just like a physical lock requires a
Efficient Continuous Monitoring – Third Party Products & Resources
Cyber threats on enterprise information are growing at an exponential rate. Federal government IT systems are at risk, from email servers to mobile phones to system networks. Security remediation tactics are growing in complexity, and these efforts require persistent attention.