Bob Flores on Developing A Culture of Cybersecurity
Mitigating enterprise cyber risk requires broad awareness and action in a way best described as having a culture of cybersecurity. Cognitio partner and co-founder Bob Flores has extensive experience in...
View ArticleHow to Turn Big Data Into a Competitive Advantage
Rick Delgado Big data, no doubt, is big right now. When it blasted on the scene, businesses jumped at the chance to use a massive amount of data to gauge what their customers wanted and needed,...
View ArticleAt The Gartner Security and Risk Management Summit: How to Stop Catastrophic...
Katie Kennedy Join Bob Flores, Executive Partner of Cognitio, and Junaid Islam, CTO of Vidder, Inc, at the Gartner Security & Risk Management Summit for their session on How to Stop Catastrophic...
View Article5 Factors Federal Agencies Should Consider When Moving To The Cloud Infographic
Katie Kennedy Moving to the cloud is not a seamless transition for most organizations. There are ways to make it much easier, however. How do you do that? You learn lessons from those that have been...
View ArticleAnalyzing an Organization’s Vulnerability Footprint from an Adversary’s...
Charles Hall NEW YORK, July 20, 2016 – Deloitte Advisory Cyber Risk Services and Cray Inc. (Nasdaq: CRAY), the global supercomputing leader, introduced today the first commercially available...
View ArticlePKWARE: Inventors of Zip now fielding smart, scalable encryption
Research Team PKWARE has a history of producing scalable, highly functional software and approaches to data storage, movement and encryption. With this post we are initiating coverage of PKWARE,...
View ArticleSeven Trends and Predictions for 2017
Nathaniel Crocker Seven Trends and Predictions for 2017 In billiards, you must call your shot ahead of time. You don’t get any points for luck. With that in mind, here are my on-the-record predictions...
View ArticleCertified White Hat Hacker Course Level 1 (Advanced)
Research Team CWHH level 1 Advanced is a hands on courses which teaches using different security tools on both web security testing and network security testing. The course teaches you how to use the...
View Article