Tech News for May 6

Millions of email names, passwords hacked in giant data breach, report says

More than 250 million email usernames and passwords have been breached and are being used by “Russia’s criminal underworld,” according to a Reuters report.  Hold Security’s Alex Holden, who reportedthe data breach, told Reuters that the breach affects many of the email addresses on Russia’s popular Mail.ru service, as well as addresses from Google, Yahoo and Microsoft. Holden said his firm came across a Russian hacker who claimed to have more than 1 billion hacked addresses for sale. In total, after eliminating duplicates, the list included 57 million Mail.ru addresses, 40 million Yahoo addresses, 33 million Hotmail addresses and 24 million Gmail addresses.

[mashable.com] 5/5

Three Cloud Trends to Watch Through 2020

UK-based research company Technavio has looked into its crystal ball to come up with three key emerging trends that will impact the growth of the enterprise cloud services market over the next four years. None of the trends are particularly ground-breaking, but they do offer some insight in terms of what your customers may be considering for the first time or as part of their cloud roadmap. “Cloud computing services enable rapid deployment and provisioning of IT infrastructure based on changing needs. Enterprise needs to meet day-to-day computing requirements encompass rapid scalability and deployment. The availability of a number of applications to meet end-user needs is another factor driving the adoption of private cloud services,” Technavio lead analyst for cloud computing research Amit Sharma said in a statement.

[talkincloud.com] 5/5

California State Agencies to Centralize Cybersecurity Efforts

To best help California beef up its cybersecurity, lawmakers say they need critical information — exactly how much money state agencies spend every year to safeguard sensitive data from potential hackers. The Assembly Privacy and Consumer Protection Committee on Tuesday approved legislation that would require state agencies to report their annual cybersecurity spending. “Lack of oversight makes it challenging to address vulnerabilities, and it makes it difficult to identify where departments might be overspending or where additional resources might be needed and how our investment as a state compares to other large companies or other states,” bill co-author Assemblyman Rich Gordon, D-Menlo Park, told the committee.

[govtech.com] 5/5

NIST unveils ‘flexible’ second draft for agency cybersecurity

No two agencies are exactly alike, nor are cyber threats all the same — that’s why the National Institute of Standards and Technology’s latest version of system security guidance can be adjusted for fit. Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems — NIST Special Publication 800-160 — is a guide for helping agencies and organizations assign value to their assets and choose the right set of tools that works best to secure their systems.

[federalnewsradio.com] 5/5

Cloud provider Accellion receives FedRAMP approval

Cloud security and storage provider Accellion announced its certification with the Federal Risk and Authorization Management Program Thursday, the latest of many cloud companies to recently win the government-wide stamp of approval. “This achievement demonstrates to our many current and prospective government customers that we take cybersecurity and the authenticity of their data extremely seriously,” Yorgen Edholm, CEO of Accellion, said in a press release. “We are actively pursuing and progressing toward full FedRAMP certification so that we can further support government agencies in their pursuit to protect sensitive data.”

[fedscoop.com] 5/5

New California law would determine what happens to your Facebook and email when you die

When it comes to dealing with the digital detritus of the dead, there isn’t exactly a standard operating procedure. How to treat the online footprints of the deceased is something companies like Facebook, Twitter and Google are only just beginning to consider. But California legislators want to pass a law regulating what companies may do with our digital records after we expire and go to the big Cloud in the sky.

[fusion.net] 5/5

University of California Builds Networking Site for IT Professionals

The University of California system has launched an online network on LinkedIn for its IT professionals, according to the Office of the President. The private group has accumulated nearly 350 participants so far, and could be worth emulating for the state of California, which has discussed how to develop a similar type of network to cultivate staff development and interdepartmental collaboration. Tom Andriola, the university system’s CIO, said the idea is for every UC IT worker is to have a profile, and they’re using LinkedIn to “not reinvent the wheel.”

[techwire.net] 5/6

Best of California Award Nominations Due May 25

The Center for Digital Government is inviting nominations for its 2016 awards program for IT professionals in California state and local government and education organizations.Nominations must be made by public-sector government, education officials, executives, managers or staff.For more information and the entry form, visit: www.govtech.com/cdg/boca2016

[techwire.net] 5/6

RFI: eDiscovery Software Market Research

The California Department of Insurance is seeking suggestions for e-discovery software that could be used in a future procurement. The department is interested in learning about costs, technology advancements and business requirements in software-as-a-service (SaaS) and/or commercial off-the-shelf (COTS) eDiscovery software that could be used in the department’s Legal Division. Responses to the RFI are due June 3. Search Event ID “0845-0000001549” on the state’s procurement website.

[techwire.net] 5/6

Big Bang, Agile or a Mix of Both?

While some in government point to instances where major system deployments are best completed using traditional waterfall development practices, the approach has its critics. Technology deemed suitable at a project’s outset can be archaic by the time roll-out nears. Emphasis on meeting a final delivery deadline for a massive project can limit time and attention on needed course corrections along the way, not to mention encourage a disconnect between the deployment team and the line of business the project was intended to serve.

[govtech.com] 5/5

Former US-CERT head lauded as NASCIO Technology Champion

Ann Barron-DiCamillo, the former director of the U.S. Computer Emergency Readiness Team, was named the 2016 Technology Champion by the National Association of State Chief Information Officers. The award, given “for her leadership in advancing information technology as an effective tool for government,” according to a release, was announced Wednesday here at NASCIO’s Midyear Conference. The award honors public sector contributions to information technology, according to the association’s website.

[statescoop.com] 5/5

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s