This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
But there are a number of groundbreaking women who have been highly successful in networking, and were highlighting 20 of them (in alphabetical order). She previously worked at Iron Mountain, where she was Executive Vice President and CTO. Be confident in what differentiates you, she said in an article about driving diversity in tech.
Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have.
Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have.
The threat landscape has expanded,” said Mr. Moran, “because now there are more actors pursuing capabilities to breach networks… the diversity of actors is shocking.” — Michael Nelson (@MikeNelson) July 30, 2014. — Matt Devost (@MattDevost) July 30, 2014. — Matt Devost (@MattDevost) July 30, 2014.
On 30 July 2014 in Reston Virginia some of the greatest minds in analytics for business outcomes and mission impact will be gathering at the Hyatt Regency Reston. This event, the Analytics 2014 Forum, is being pulled together by the United States Geospatial Intelligence Foundation ( USGIF ) and our team at Analyst One. By Bob Gourley.
in Advanced Research Contracts For its Labs Division. Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. FAIRFAX, VA—April 7, 2014 —Invincea, Inc., contract with the U.S.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? Office of Management and Budget. Independent Consultant. Defense Intelligence Officer for Cyber. Should it be?
Date: Thursday, May 15, 2014 Time: 2:00 pm EDT Guest Speaker: Dave Shackleford Shackleford is Lead Faculty at IANS, founder and principal consultant with Voodoo Security and has consulted with hundreds of firms in security, regulatory compliance, network architecture and engineering. To sign up visit: [link].
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. Presented by Cloudera. Bob Gourley.
Haystax Technology Names Advisory Board Members. McLean, VA – January 14, 2014 – Haystax Technology, Inc. He completed his career as the CIA’s CTO, where he was responsible for ensuring that the agency’s technology investments matched the needs of its mission. • Bob Gourley, Founder and CTO, Crucial Point LLC.
Area Recognized for Extraordinary Talent, Inspiring Leadership and Success in the Technology Community. Fairfax, VA (PRWEB) January 23, 2014. Women in Technology (WITSM), the premier organization contributing to the success of professional women in the Washington, D.C.-area Mari Spyker, Blackstone Technology Group.
Tyrone Grandison, chieftechnologyofficer for Pearl Long Term Care Solutions. Grandison, who lives in Seattle, has launched and led numerous startups, worked for the White House and government agencies during the Obama Administration, holds an adjunct professorship, and done research and consulting.
.” — Uber appointed Sukumar Rathnam as its new chieftechnologyofficer. Long-time Uber CTO Thuan Pham stepped down earlier this year shortly before the company cut 25% of its global workforce. Founded in 2014, Vettd.ai based Behavox as its first chief product officer. The Redmond, Wash.,
F5 Networks appointed Elizabeth Buse to its board of directors. Buse previously served as co-CEO and CEO of Monitise, a global mobile banking and payments company, from 2014 to 2015. Prior to that, she was a longtime leader at Visa, retiring from the company in 2014 as EVP of global services. Scott Porad. CoreStack raised $8.5
Analytics 2014: Insights for Mission impact began with opening remarks from Keith Masback , Chief Executive Officer, United States Geospatial Intelligence Foundation (USGIF). Bray, Chief Information Officer, FCC, prompted the question of how to tackle the changing world? By Katie Kennedy. Bob Gourley.
Long served as the director of the NGA from 2010 until her retirement in 2014. Another longtime Amazon exec, Dorothy Li , took a job at Seattle startup Convoy as its new CTO. The former head of engineering and science at Amazon Web Services Health Jean-Olivier Racine joined Outset Medical as its chieftechnologyofficer.
The founding team includes: • CEO Peter Horadan, previously EVP of engineering and CTO at tax automation startup Avalara. Chief Strategy Officer Matthew Shanahan , previously chief operating and innovation officer at Globys, a software company offering digital billing products. Read more about Fabric and its $9.5
— Benn Bollay is now CTO at B2B software startup ReachSuite. The longtime software engineer most recently was CTO at Fusebit, a Seattle-based startup he founded that helps developers with software integration capabilities. Bollay was also the founder and CTO at Union Bay Networks, a Seattle cloud startup acquired by Apple in 2014.
We are proud to recognize their contributions and honor the influence they have had on the industry at large," said Jacobs, the first Information Assurance Director for the National Security Agency (NSA) and a respected cyber security consultant to government and industry. Class of 2014: F. Lipner is named as an inventor on 12 U.S.
CEO of the Year finalists in the 2022 GeekWire Awards, clockwise from upper left: François Locoh-Donou, of F5 Networks; Maria Colacurcio of Syndio; Luis Ceze of OctoML; Chris Diorio of Impinj; and Xiao Wang of Boundless. He served as CTO before stepping into the CEO role in 2014. Impinj went public in 2016.
Statistics from the Department of Justice reveal that over 7% of US households, representing more than 11,000,000 Americans, suffered some form of identity theft in 2014. The total financial loss from identity theft alone exceeded $24 billion in 2014, nearly double the amount lost in 2010. Regrettably this is already happening.
James Collin, a professional connection who was at that time Delaware State CIO, asked Lane if he would be interested in stepping into the vacant CTO role. DelBene had served as a senior advisor to the US Health and Human Services secretary from December 2013 to July 2014, helping to turn around the troubled Healthcare.gov launch.
Vamosi: Maybe you remember this: In 2014, researchers Charlie Miller and Chris Valasek succeeded in hacking a Jeep Cherokee while a reporter was driving it on a freeway during rush hour in St Louis, Missouri. Steve Grobman, CTO with Intel’s security group had this to say: CNBC: Yeah, so I think that nothing is ever impossible.
All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Event attendees will also hear about how to securely manage big data, cloud computing, mobility, social networking, critical infrastructure and more! Registration and Networking Breakfast. Wolf Tombe , CTO, U.S.
Given software's significant role in helping accomplish agency missions, 3 Phoenix tapped for ope architecture work Washington Technology (Today) - 3 Phoenix Inc. million Navy contract. million contract extension. digital audiences from January 2014 until January 2015 with some interesting information that reinforces trends.
Today another signature achievement of the Obama Administration – the First Responder Network Authority – appears headed down a path similar to the original healthcare.gov. This “company” is the First Responder Network Authority – FirstNet. We can recognize the danger signs. But will they act? FirstNet must be Innovative.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content