This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
But there are a number of groundbreaking women who have been highly successful in networking, and were highlighting 20 of them (in alphabetical order). She previously worked at Iron Mountain, where she was Executive Vice President and CTO. Be confident in what differentiates you, she said in an article about driving diversity in tech.
Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have.
Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have.
The threat landscape has expanded,” said Mr. Moran, “because now there are more actors pursuing capabilities to breach networks… the diversity of actors is shocking.” — Michael Nelson (@MikeNelson) July 30, 2014. — Matt Devost (@MattDevost) July 30, 2014. — Matt Devost (@MattDevost) July 30, 2014.
Former CIA CTO Gus Hunt Joins Venture Capital Firm Artis Ventures’ Board of Advisors. 27, 2014 (GLOBE NEWSWIRE) — From his office in Langley, Va., former Central Intelligence Agency CTO Gus Hunt made some of the government’s most important technology decisions. – bg. San Francisco, Feb.
Tapping Global Threat Intelligence To Secure Enterprise Networks. August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. Chris Petersen, CTO/Co-Founder of LogRhythm. .
16-21 Nov 2014 the International Conference for High Performance Computing, Networking, Storage and Analysis (SC14) was hosted in New Orleans and once again it did not disappoint! With that in mind I thought I would tak. To read more please log in.
By Deepak Kumar Editor’s note: This guest post is by Deepak Kumar, Founder and CTO of Adaptiva. New technologies like these are delivering dramatic efficiency gains in many areas; however, they are stressing infrastructure and creating unrealistic expectations. CTO Cyber Security DoD and IC Mobile' – bg.
CTO Cyber Security DoD and IC Mobile Amanda Knox Android Fixmo Google Innocence Network Mobile World Congress samsung Security' The real reason to watch is to get an overview of their well engineered approach and how it has evolved over time to the benefit of enterprise users.
The open-source eBPF (extended Berkeley Packet Filter) technology has become one of the most critical foundational elements of networking with Linux over the last decade. 11, users and developers detailed how they are working with eBPF today and where the technology is headed in the future. At the eBPF Summit on Sept.
On 30 July 2014 in Reston Virginia some of the greatest minds in analytics for business outcomes and mission impact will be gathering at the Hyatt Regency Reston. This event, the Analytics 2014 Forum, is being pulled together by the United States Geospatial Intelligence Foundation ( USGIF ) and our team at Analyst One. By Bob Gourley.
What follows is an interview in which Lenzner comments on trends in the year that was, elaborates on trends for the year that is, and provides tips on how professionals and businesses can take full advantage of the trends that will unfold in 2014. Q: In your opinion what are the Top 5 anticipated tech trends for 2014?
With this post we would like to give you a high level overview of their Spring 2014 Cohort. Our products can integrate with existing solution suites and instantly detect and pre-empt abnormal behavior in devices and networks without compromising performance or privacy. CardKill Inc. Fast Orientation, Inc.
The inaugural PentahoWorld conference is scheduled for October 8-10, 2014 at the Hilton Orlando Bonnet Creek in Orlando, Florida. Networking with industry experts, customers, and partners. Analysis Big Data CTO DoD and IC Data integration Orlando Florida Pentaho PentahoWorld' Bring Your Data to Life. Next Steps to Learn More.
By Bob Gourley It is time we all began to focus more on the coming age of a totally networked, software-enhanced, continually enhancing, device enabled world. Rodney Brooks, CTO and Chairman of Rethink Robotics. Now you have an opportunity to help shape this coming age by participating with other thought leaders to build the future.
We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. December 3 & 4, 2014 – The National Press Club. Networking Lunch – Information Sharing Hour. Register Here. about SINET.
Editor’s note: I’ve referenced before my participation on the board of Centripetal Networks , and their ability to deliver large scale commercial solutions of MITRE’s IBIP are an area I am particularly proud of. In February 2014 they published a succinct overview on the topic which you can find at this factsheet.
By Bob Gourley The agenda for the 3rd Annual Cloudera Federal Forum (6 Feb 2014, Hanover MD) has firmed up and will no doubt lead to an incredible event. 7:00 AM Registration, Networking and BreakfastGeneral Session. Tom Reilly – Chief Executive Officer, Cloudera. If you have not registered yet please do so now.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? ChiefTechnologyOfficer. Chief Information Officer. Principal and CTO, Global Consulting Technology.
The following is from the RSA conference press release : Congratulations to Red Owl Analytics for being named the Most Innovative Company at RSA Conference 2014! Gerhard Eschelbeck, ChiefTechnologyOfficer and Senior Vice President, Sophos. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'
On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. This means designing early at the device and platform and network. Responding effectively and quickly is fundamental when an enemy infiltrates a network.
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. Presented by Cloudera. Bob Gourley.
Date: Thursday, May 15, 2014 Time: 2:00 pm EDT Guest Speaker: Dave Shackleford Shackleford is Lead Faculty at IANS, founder and principal consultant with Voodoo Security and has consulted with hundreds of firms in security, regulatory compliance, network architecture and engineering. To sign up visit: [link].
A look back at 2014 reveals any number of breaches that can be traced back to malicious or exploited insiders. Interestingly enough, Palo Alto Networks is working on ways to help its customers leverage the high fidelity data coming out of its Enterprise Security Platform.
2014 Edition), Galaxy Note Edge, Galaxy Alpha, Galaxy Tab S 8.4, and the Galaxy IPSEC Virtual Private Network (VPN) Client to the Commercial Solutions for Classified (CSfC) Program Component List. The listed Samsung devices are available for use with classified government networks and data. Galaxy Tab S 10.5
Palo Alto Networks has just announced a new public sector advisory council and the addition of Ryan Gillis to the Palo Alto Networks team as Vice President of Government Affairs and Policy. Additionally, Palo Alto Networks CEO has been appointed to the President''s NSTAC. By Bob Gourley. Santa Clara, Calif., Santa Clara, Calif.,
FedCyber will be held on 5 Nov 2014 at the Tysons Corner Marriott. This is a great opportunity to work directly with peers in the federal technology ecosystem to enhance the cyber security of your organization and to share lessons learned. Our 2014 agenda for FedCyber is shaping up and you won’t want to miss it.
While the most important driver in today’s business atmosphere may be increased technology innovation, a new study indicates that IT professionals worry leadership is not doing enough to adopt … Read more on Midsize Insider. “If you’re not already spending a lot of capital in … Read more on NewsFactor Network.
December 19, 2014 FBI National Press Office (202) 324-3691. The FBI has determined that the intrusion into SPE’s network consisted of the deployment of destructive malware and the theft of proprietary information as well as employees’ personally identifiable information and confidential communications. Washington, D.C.
April 11, 2014. – The National Geospatial-Intelligence Agency this week joined GitHub, a popular social network that allows programmers to collaborate and share computer code between users. The network allows developers to modify, distribute and perform work on the code – either to improve NGA’s product, or for their own use. “Our
None of them were really about technology. The really interesting stories, at least from a CTO perspective, are big technology mega trends that are forcing change and positive improvements in enterprise IT. 2013 saw many government technology professionals begin to examine this construct. Did I miss any?
Area Recognized for Extraordinary Talent, Inspiring Leadership and Success in the Technology Community. Fairfax, VA (PRWEB) January 23, 2014. Women in Technology (WITSM), the premier organization contributing to the success of professional women in the Washington, D.C.-area Analysis Big Data CTO' Lisa Hook, Neustar.
Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. FAIRFAX, VA—April 7, 2014 —Invincea, Inc., The company is venture capital-backed and based in Fairfax, VA.
Haystax Technology Names Advisory Board Members. McLean, VA – January 14, 2014 – Haystax Technology, Inc. He completed his career as the CIA’s CTO, where he was responsible for ensuring that the agency’s technology investments matched the needs of its mission. • Bob Gourley, Founder and CTO, Crucial Point LLC.
Sebastopol, CA, February 26, 2014 —The “punctuated equilibrium” theory asserts that rapid bursts of change upend the leisurely pace of species stasis, creating events that result in new species and leave few fossils behind. Rodney Brooks, CTO and Chairman of Rethink Robotics. Everything that Rises Must Converge.
Tyrone Grandison, chieftechnologyofficer for Pearl Long Term Care Solutions. Tyrone Grandison, second from right, waiting to enter the White House in 2014 when he was a Presidential Innovation Fellow working for the Obama Administration. Your preferred social network? Photo courtesy of Tyrone Grandison).
Example: Amazon software deployments for May 2014 for production hosts and environments: 11.6 Malware, continuous monitoring, and network scanners can tell you which barn doors are open and that the horses are leaving, but leave enterprises with a massive punch list of fix it items. For want of a message the cyberbattle was lost.
Former Rover CTO Scott Porad joined peer-to-peer moving service Dolly as chieftechnologyofficer. Prior to joining Rover in 2013, Porad was CTO for Cheezburger and held multiple director roles at Bellevue, Wash.-based Founded in 2014, Dolly is led by co-founder and CEO Mike Howell. Scott Porad.
Founded in 2014, Dolly connects customers with movers for short-distance deliveries. In turn, when Dolly users’ moves are too large or too far for its network of Helpers, the job can be funneled to another subsidiary of Updater, MoveHQ, which supports a nationwide network of full-service moving companies. (Dolly Photo).
.” — Uber appointed Sukumar Rathnam as its new chieftechnologyofficer. Long-time Uber CTO Thuan Pham stepped down earlier this year shortly before the company cut 25% of its global workforce. Founded in 2014, Vettd.ai He is also an angel investor and advisor with the Alliance of Angels network.
Analytics 2014: Insights for Mission impact began with opening remarks from Keith Masback , Chief Executive Officer, United States Geospatial Intelligence Foundation (USGIF). Bray, Chief Information Officer, FCC, prompted the question of how to tackle the changing world? By Katie Kennedy. Bob Gourley.
– 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., To meet this growing demand, data must be always available and easily accessed by massive volumes and networks of users and devices. Analysis Big Data CTO' – bg.
F5 Networks appointed Elizabeth Buse to its board of directors. Buse previously served as co-CEO and CEO of Monitise, a global mobile banking and payments company, from 2014 to 2015. Prior to that, she was a longtime leader at Visa, retiring from the company in 2014 as EVP of global services. Scott Porad. Snohomish, Wash.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content