‘We the People’ 2.0 to include APIs, Feds Want Secure Mobile with Back Door;...
By Ryan Kamauff Here are the top cyber news and stories of the day. ‘We the People’ 2.0 to include APIs – “White House Deputy Director of Online Platform Peter Welsch wrote on the White House blog that...
View ArticleDefense Intelligence Worldwide Conference: Bring your disruptive technology...
By BobGourley The new Defense Intelligence Worldwide Conference evolved from an old event with roots in intelligence systems. With a new, more mission-focused event, I expect the technology on the...
View ArticleINSA Publishes White Paper on Intelligence Community Information Technology...
By Bob Gourley The Intelligence and National Security Alliance (INSA) has released a white paper documenting the vision and approach for enhancing enterprise information technology in support of...
View ArticleTriumfant: Malware Detection and Remediation
By Marcus Williams Background Triumfant, Inc. is a privately held company with a focus on detecting and remediating cyber attacks. Triumfant has a ’Assume Nothing, Scan everything’ approach to cyber...
View ArticleEvernote hacked, 2013 Cloud Security concerns and more
By Ryan Kamauff Here are the top cyber news and stories of the day. Evernote Hack Exposes User Data, Forces Extensive Password Resets - If you are an Evernote user, chances are you got quite the shock...
View ArticleOrganizations using web crawlers, DARPA will no longer support CFT, VMware’s...
By Marcus Williams More Cyber News we are tracking: Several organizations around the country have been collecting and selling PII, DARPA will no longer support CFT, VMware’s Horizon Mirage 4.0, and...
View ArticleEnter To Win Free Copy Of The Ethics Of Big Data by Kord Davis
By Bob Gourley The Big Data era is upon us and it is bringing incredibly interesting new situations for humanity to think through. Ethical decisions on topics like privacy, security and abuse of...
View ArticleCentripetal Networks Provides Internet Scale Cyber Defense
By Bob Gourley I’m on the board of Centripetal Networks, a firm with dramatically virtuous technology that I believe will change the world. With this post I’ll tell you more about this firm, with a...
View ArticleReady or not, software is eating the government contracting world
By Bob Gourley As readers of CTOvision you no doubt track the trends and are as aware as any of how software transforms industries, sometimes in shockingly brutal ways. I take no pleasure in telling...
View ArticleThe Use of Recorded Future for Cyber Security Professionals
By Bob Gourley We have previously written about Recorded Future, a fast moving startup delivering predictive signals from the noise of the web. Recorded Future provides a blog that captures several...
View Article3D printing facial implant, online orders delivered in fifteen minutes and more
By Marcus Williams Today’s cyber news we are tracking: 3D printing facial implant, Receiving online orders in less than 15 minutes, AV world rankings, and more. Technology has reinvented itself again....
View ArticleAre you working on BYOD? You might have things backwards. Think BWTD
By Bob GourleyEverybody’s talking about the bring-your-own-device (BYOD) trend and the associated security challenges facing IT departments in both the public and private sectors. We have sure written...
View ArticleWould you like the truth about the NSA? Watch this one minute video
By Bob GourleyEveryone in the national security establishment knows of NSA’s Deputy Director, John C Inglis. He is without a doubt one of the most professional, competent, courageous leaders in the...
View ArticleA look at Silver Tail Systems
By Kimberly KellyWith cyber-attacks at a staggering 20 million per day, we have all been on the receiving end of a cyber-attack from either email spoofing or viruses sent our way. Silver Tail Software...
View ArticleGoogle tests encryption for Drive files
By Kimberly KellySince the leaking of classified documents from the National Security Agency (NSA), many people have been wary about where their documents are stored and what they contain. So with this...
View ArticleMore on hackable SIM cards
By Kimberly KellyHundreds of millions (approximately 25%, of 1970s-era DES) SIM cards are still in use today, and these cards are susceptible to hijacking. Not only could hijackers have access to...
View ArticleA look at the Hadoop Big Data Reservoir with Platfora’s Peter Schlampp
By Ryan KamauffPeter Schlampp, the Vice President of Products and Business Development at Platfora, explains what the Hadoop Big Data reservoir is and is not in this webinar that I watched today....
View ArticleCan you spot phishing? Probably not!
By Kimberly KellyNorth Carolina State just conducted a study that showed only 7.5% ( yes, that is less than 10%) of the participants were able to identify fake emails. The study also showed that more...
View ArticleIt’s Time To Get Serious About Big Data Security
By Kevin T. SmithOver the last few years, we have witnessed a substantial amount of buzz about Big Data, and we have seen the large-scale adoption of Big Data analytics solutions. Organizations are...
View ArticleCTOlabs publishes White Paper on Web Intelligence Support to Cyber Operations
By Bob GourleyCTOlabs.com, a subsidiary of the technology research, consulting and services firm Crucial Point LLC and a peer site of CTOvision.com, has just announced a white paper titled ”Leveraging...
View Article