Remove 2014 Remove Authentication Remove Programming
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

A sign of Chinas maturing cyber capabilities CrowdStrike attributes Chinas increasingly dominant position in global cyber espionage to a decade of strategic investments, following General Secretary Xi Jinpings 2014 call for the country to become a cyber power.

Industry 330
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

A sign of Chinas maturing cyber capabilities CrowdStrike attributes Chinas increasingly dominant position in global cyber espionage to a decade of strategic investments, following General Secretary Xi Jinpings 2014 call for the country to become a cyber power.

Industry 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. As the Agency CISO, Mr. Bigman managed a large organization of technical and program officers responsible for the protection of all Agency information. Dr. Richard Marshall, Esq., Marshall graduated from The Citadel with a B.A.

Software 257
article thumbnail

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA

CTOvision

TSCP’s Trusted Cyber Collaboration Workshop is an opportunity for professional information sharing focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs.

Big Data 262
article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

The 2014 Trusted Cyber Collaboration Workshop is being held 24-26 Sep in DC. The event is focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs. By Bob Gourley.

Security 258
article thumbnail

6 revealing statistics about career challenges Black IT pros face

CIO Business Intelligence

While most people adjust behaviors or appearance at work, Black tech talent are “more frequently code-switching in aspects deeply related to their identity, which elicits many questions about the way authentic ‘Blackness’ is received in the industry,” according to the report from Russel Reynolds Associates and Valence.

Industry 290
article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

This year, two of 2014’s biggest stories will intersect as security and Windows 10 prepare to re-shape the Enterprise. Security breaches impacted some of the most well-known corporations in 2014, which is one reason IT executives list security as the No. and that Windows 10 was better than the Enterprise could have imagined.

Windows 150