GSA Cancels two more conferences, ICS' are still under attack

gsa_logo-300x300Here are the top cyber news and stories of the day.

  • Cloud security service protects WordPress content – “Developer NorseCrop has launched a cloud security service designed to protect open-source content management systems that many SMBs use to run their Internet sites.” NorseCrop has Joomla and Drupal versions to follow as well. This service will help SMBs create a stronger (more secure) WordPress offering. Via ZDNet, more here.
  • Deleted cloud files can be recovered from smartphones, researchers find - “Researchers were able to recover Word docs, PDFs, and other data deleted from Box, Dropbox, and SugarSync with iPhone and Android devices.” This is unwelcome news for many users of cloud services. Researchers added the files to the service, synced them locally on the devices and then deleted them, but found that fragments were left behind. Via InfoWorld, more here.
  • GSA cancels two summer conferences – The GSA will be canceling FedForum and SmartPay Training Forum due to travel cuts. Today’s budgets will be evidenced in a significantly smaller number of federal conferences, which increases the need for sharing and collaboration services. Via Federal Times, more here.
  • Google Chrome: Best security tips for safer browsing – Google Chrome offers some increased security capabilities compared to other browsers; however, there are still ways to activate stronger security parameters. This article goes further in depth into how to set these security parameters. Via ComputerWorld, more here.
  • Despite new security in Galaxy S4, BlackBerry remains king – A security expert has lauded the new security setup on the Samsung Galaxy S4, but still believes the BlackBerry Z10 has a higher degree of security. Both devices use segregation for “work and play,” but BlackBerry has a deeper level of security by requiring their BB Enterprise Server behind the company firewalls. Via Network World, more here.
  • Changing the IT culture at NIST - “In an interview with FedScoop, Brockett said he’s been pushing to change the IT culture at NIST in the two and a half years since becoming CIO, aiming to give its world-class scientists a world-class IT organization.” Brockett has a cloud based email and collaboration on the horizon, along with a hybrid cloud environment, virtual desktop infrastructure and a mobile architecture that will support their entire enterprise. Via FedScoop, more here.
  • Honeypots Show ICS’ Under Attack – Over a 28 day period, honeypots set up by Trend Micro were attacked 39 times, by 11 countries. “For some background, Trend Micro set up three separate honeypots, designed to look like genuine industrial machines, connected to the Internet. One was on Amazon’s public cloud, another on a private Dell server, while the final one included an actual Programmable Logic Controller (PLC) controller used in the industrial environment.” China was responsible for 35% of the attacks while the US was responsible for 19% of all attacks. Via ISS Source, more here.

Sign up for your free CTOvision Pro trial today for unique insights, exclusive content and special reporting.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.


Recent Research

USN Quarterly Industry Day at Charleston: What you need to know to compete

Request Your Invite to the 20 May 2014 Andreessen Horowitz Fed Forum in DC

Amazon Hopeful that Fire TV will Spread

What The Enterprise IT Professional Needs To Know About Git and GitHub

3D Printing… At Home?

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

About Ryan Kamauff

Ryan Kamauff is a senior analyst with Crucial Point LLC. He produces technology focused content for and reports on analytical megatrends at the new analysis focused Analyst One.