Quantcast
Channel: Security – CTOvision.com
Browsing all 90 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

‘We the People’ 2.0 to include APIs, Feds Want Secure Mobile with Back Door;...

By Ryan Kamauff Here are the top cyber news and stories of the day. ‘We the People’ 2.0 to include APIs – “White House Deputy Director of Online Platform Peter Welsch wrote on the White House blog that...

View Article


Image may be NSFW.
Clik here to view.

Defense Intelligence Worldwide Conference: Bring your disruptive technology...

By BobGourley The new Defense Intelligence Worldwide Conference evolved from an old event with roots in intelligence systems.  With a new, more mission-focused event, I expect the technology on the...

View Article


Image may be NSFW.
Clik here to view.

INSA Publishes White Paper on Intelligence Community Information Technology...

By Bob Gourley The Intelligence and National Security Alliance (INSA) has released a white paper documenting the vision and approach for enhancing enterprise information technology in support of...

View Article

Image may be NSFW.
Clik here to view.

Triumfant: Malware Detection and Remediation

By Marcus Williams Background Triumfant, Inc. is a privately held company with a focus on detecting and remediating cyber attacks. Triumfant has a  ’Assume Nothing, Scan everything’ approach to cyber...

View Article

Image may be NSFW.
Clik here to view.

Evernote hacked, 2013 Cloud Security concerns and more

By Ryan Kamauff Here are the top cyber news and stories of the day. Evernote Hack Exposes User Data, Forces Extensive Password Resets - If you are an Evernote user, chances are you got quite the shock...

View Article


Image may be NSFW.
Clik here to view.

Organizations using web crawlers, DARPA will no longer support CFT, VMware’s...

By Marcus Williams More Cyber News we are tracking: Several organizations around the country have been collecting and selling PII, DARPA will no longer support CFT, VMware’s Horizon Mirage 4.0, and...

View Article

Image may be NSFW.
Clik here to view.

Enter To Win Free Copy Of The Ethics Of Big Data by Kord Davis

By Bob Gourley The Big Data era is upon us and it is bringing incredibly interesting new situations for humanity to think through. Ethical decisions on topics like privacy, security and abuse of...

View Article

Image may be NSFW.
Clik here to view.

Centripetal Networks Provides Internet Scale Cyber Defense

By Bob Gourley I’m on the board of Centripetal Networks, a firm with dramatically virtuous technology that I believe will change the world. With this post I’ll tell you more about this firm, with a...

View Article


Image may be NSFW.
Clik here to view.

Ready or not, software is eating the government contracting world

By Bob Gourley As readers of CTOvision you no doubt track the trends and are as aware as any of how software transforms industries, sometimes in shockingly brutal ways. I take no pleasure in telling...

View Article


Image may be NSFW.
Clik here to view.

The Use of Recorded Future for Cyber Security Professionals

By Bob Gourley We have previously written about Recorded Future, a fast moving startup delivering predictive signals from the noise of the web. Recorded Future provides a blog that captures several...

View Article

Image may be NSFW.
Clik here to view.

3D printing facial implant, online orders delivered in fifteen minutes and more

By Marcus Williams Today’s cyber news we are tracking: 3D printing facial implant, Receiving online orders in less than 15 minutes, AV world rankings, and more. Technology has reinvented itself again....

View Article

Image may be NSFW.
Clik here to view.

Are you working on BYOD? You might have things backwards. Think BWTD

By Bob GourleyEverybody’s talking about the bring-your-own-device (BYOD) trend and the associated security challenges facing IT departments in both the public and private sectors.  We have sure written...

View Article

Image may be NSFW.
Clik here to view.

Would you like the truth about the NSA? Watch this one minute video

By Bob GourleyEveryone in the national security establishment knows of NSA’s Deputy Director, John C Inglis. He is without a doubt one of the most professional, competent, courageous leaders in the...

View Article


Image may be NSFW.
Clik here to view.

A look at Silver Tail Systems

By Kimberly KellyWith cyber-attacks at a staggering 20 million per day, we have all been on the receiving end of a cyber-attack from either email spoofing or viruses sent our way. Silver Tail Software...

View Article

Image may be NSFW.
Clik here to view.

Google tests encryption for Drive files

By Kimberly KellySince the leaking of classified documents from the National Security Agency (NSA), many people have been wary about where their documents are stored and what they contain. So with this...

View Article


Image may be NSFW.
Clik here to view.

More on hackable SIM cards

By Kimberly KellyHundreds of millions (approximately 25%, of 1970s-era DES) SIM cards are still in use today, and these cards are susceptible to hijacking. Not only could hijackers have access to...

View Article

Image may be NSFW.
Clik here to view.

A look at the Hadoop Big Data Reservoir with Platfora’s Peter Schlampp

By Ryan KamauffPeter Schlampp, the Vice President of Products and Business Development at Platfora, explains what the Hadoop Big Data reservoir is and is not in this webinar that I watched today....

View Article


Image may be NSFW.
Clik here to view.

Can you spot phishing? Probably not!

By Kimberly KellyNorth Carolina State just conducted a study that showed only  7.5% ( yes, that is less than 10%) of the participants were able to identify fake emails. The study also showed that more...

View Article

Image may be NSFW.
Clik here to view.

It’s Time To Get Serious About Big Data Security

By Kevin T. SmithOver the last few years, we have witnessed a substantial amount of buzz about Big Data, and we have seen the large-scale adoption of Big Data analytics solutions. Organizations are...

View Article

Image may be NSFW.
Clik here to view.

CTOlabs publishes White Paper on Web Intelligence Support to Cyber Operations

By Bob GourleyCTOlabs.com, a subsidiary of the technology research, consulting and services firm Crucial Point LLC and a peer site of CTOvision.com, has just announced a white paper titled  ”Leveraging...

View Article
Browsing all 90 articles
Browse latest View live