2015

article thumbnail

List of Cyber Threat “Wake-Up Calls” Growing: Policy makers have been hitting the snooze button since 1970

CTOvision

The list below is an update to our reference of "Cyber Security Wake-Up Calls." What does it take to be on the list? Generally each of the events below was so significant policy makers were loudly proclaiming to all who would listen that they were a wake-up call. This means there are reflections in public policy documents, speeches and the press that cite leaders using the phrase.

Policies 328
article thumbnail

E-Government: A Graduate Class

CIO Musings

Wow! It has been 6 months since I posted anything to this blog. Not setting a very good example I am afraid. It has been a busy winter and spring, and I have a lot of material stored up. Now if I just had the time to write! One thing I am working on for this fall that I am very excited about is a class at VCU that is near and dear to me: E-Government.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

'By Matt Southmayd. Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness. Available data suggest that 84% of corporations have malware on their networks.

Insurance 319
article thumbnail

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a hacker already knows how to exploit the tech in every way possible.

Network 308
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Sony Hack in Context

CTOvision

'By Chris Mellon. The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. The bad news is that neither the press nor the government is placing the Sony attack in context. Considering the Sony case in isolation is equivalent to looking at a single piece on a chessboard, hardly an effective way to evaluate our predicament or assess what we need to do to prevent further losses.

article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

Editor's note: I was so excited to read of this year's inductees. All are great champions who have given to the community over decades.-bg. BALTIMORE , Sept. 14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland.

Security 291

More Trending

article thumbnail

Google, like Samsung, is eavesdropping on your private conversations

CTOvision

If you use Google Chrome , you could be subject to eavesdropping by Google. Similar to what Samsung's TVs are doing, the Chromium browser listens to conversations in the vicinity of your laptop, PC, or tablet, and transmits it back to Google. Ostensibly, this is part of the " Google Now " voice activation feature of Chrome. Privacy campaigners and some developers think it's more nefarious.

Google 289
article thumbnail

The President Speaks At Hadoop World: Introduces DJ Patil as Nation’s First Chief Data Scientist

CTOvision

'By Bob Gourley. Data science history was made on 19 Feb 2015. For the first time in the history of Hadoop World, the President of the United States gave a keynote. Dwell on that for a bit. This is huge. No matter what your politics is, you really have to agree, this is huge. After the President''s address also see the overview provided by DJ Patil, the new Chief Data Scientist for the federal government.

Data 290
article thumbnail

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet itself.

Security 289
article thumbnail

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts. The FBI led Internet Crime Complaint Center (IC3) is playing an increasingly important role in helping consumers and victims of fraud know the reality of the threats facing them from cyberspace.

Internet 288
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

CTIIC to be a useful agency: Issues addressed by Former Intelligence Community Technology Leaders

CTOvision

'By Matt Southmayd. Cybersecurity is one of the most important issues facing organizations today. It is so important that President Obama addressed it 20 January during his State of the Union address. The President talked about the urgent need to ensure that "no foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families, especially our kids.

article thumbnail

Don’t Buy A Samsung Smart TV Till You Understand The Threat To Your Business And Personal Information

CTOvision

'By Bob Gourley. The fine print offered by Samsung regarding their new Smart TV is something you need to dwell on. Not only does the TV recognize your voice, but it will record your conversations even when you do not know you are being listened to. Additionally, this information will be used by Samsung. And, according to their fine print, may also be used by third-parties they decide to work with.

Big Data 281
article thumbnail

NGA and DigitalGlobe Release Powerful Application To Community Under Open Source License

CTOvision

'By Bob Gourley. “Never doubt that a small group of thoughtful, committed, citizens can change the world. Indeed, it is the only thing that ever has.”. ? Margaret Mead. Editor''s note: I''ve been in the position to observe both NGA and DigitalGlobe as organizations and have also been honored to meet both the two leaders referenced in this release, and I consider their work to be proof yet again that small teams of committed people can work wonders in the world.

article thumbnail

New DoD Rules For Contractors Focus On Enhancing Security and Incident Response

CTOvision

On 26 August 2015 the Department of Defense (DoD) published a new rule entitled the "Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018). You can read the details of this new rule here: Download “DoD Rules On Protecting Data In Contractor Systems” 26-Aug-Federal-Registrar-New-DoD-Rules-For-Cyber.pdf – Downloaded 8 times – 290 kB.

Security 277
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat

CTOvision

We recently had the opportunity to interview the Director for Intelligence (J2) for the Joint Chiefs of Staff, RADM Paul Becker, USN. RADM Becker has served in this position since September 2013. The Joint Staff J2 is a position requiring a constant awareness of the day-to-day threats to the nation. Becker had the perfect background for this position, having served in a similar capacity at the United States Pacific Command, the combatant commander with the largest area of responsibility in the U

Strategy 276
article thumbnail

Boston Globe: Tamr is Number One Small Company In Boston

CTOvision

There is something special about Tamr. As technologists we focus on things like their ability to help organizations make better decisions through smart, differentiated technologies. Results are what matters in enterprise IT. The savvy enterprise leader knows this. Really great firms deliver results long term. How can you know if you are dealing with a firm like that?

Company 275
article thumbnail

The Wisdom Of Carl Sagan On Science, Government, and Even Enterprise IT and Digital Risk

CTOvision

Of course you know Carl Sagan the distinguished astronomer and great explainer of science via best selling books and the TV series Cosmos. One of his last interviews was conducted by Charlie Rose in May 1996. The clip below captures a very important message from this discussion, one I think he really nailed for its relevance to the technological world we live in.

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

'By Bob Gourley. CTOvision is very proud to be a media sponsor of the 4th annual Cloudera Federal Forum. If you are into technology and government and want to find ways to enhance your ability to serve big missions you need to be at this event, 25 Feb at the Hilton McLean Tysons Corner. The Cloudera Federal Forum, now in its 4th year, has always been filled with lessons learned, best practices and informative glimpses into what is coming from the big data tech community.

article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

National Security Software On Wall Street: Cognitio’s Roger Hockenberry Comments

CTOvision

Technology that has been used to hunt terrorists is now gaining traction with Wall Street to enhance customer outcomes, make better decisions and even track down fraud. The Wall Street Journal examined this trend in their piece titled: Spy Software Gets a Second Life on Wall Street. They reported on a wave of companies with ties to the intelligence community "winning over" the world of finance.

article thumbnail

Cybersecurity: Too Often Overlooked is the Impact to the Individual

CTOvision

'By Matt Southmayd. Recently, there have been questions raised as to why corporations have been slow to be more vigilant about Cybersecurity. In the scheme of a large organization, it is often deprioritized because the minimal impact to the bottom line is a risk that is deemed acceptable to the business. For example, Target’s high profile breach cost the company $264 million dollars which may seem like a significant financial loss.

Insurance 272
article thumbnail

Airbus confirms software errors/configuration brought down A400M transport plane

CTOvision

The Register is reporting that badly configured software, installed incorrectly, is responsible for the crash of an Airbus A400M transport plane. Engine control software, installed wrong, was to blame. The A400M crashed just after takeoff on its first real production test flight, 9 May near Seville's San Pablo Airport, killing four. For the initial report on the software see: The Register.

article thumbnail

InfoGraphic: Surprising Things You Don’t Know About Big Data

CTOvision

'By Michael Johnson.

Big Data 271
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

The Megatrend of Cloud Computing: An update for technology decision-makers

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the first of these trends, Cloud Computing.

Cloud 270
article thumbnail

What Is The Difference Between Data Governance and Big Data Governance?

CTOvision

The video at this link and embedded below starts with a great question: What is the difference between data governance and big data governance? Well we all know that the theory should be that there should be no difference. But the reality is that Hadoop and Spark and the many new approaches around those platforms require more thought and actions to optimize data governance.

Big Data 270
article thumbnail

The Megatrend of Artificial Intelligence: An update for technology decision-makers

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence is the discipline of thinking machines.

article thumbnail

Four Ways Big Data is Impacting E-Commerce

CTOvision

From assessing the effectiveness of your current operation and efforts to ensuring that your business has a more complete understanding of the needs of its customers or clients, data aggregation and analysis services have the potential to change the way that merchants and retailers operate in today's increasingly digital marketplace. The greater insight and understanding that may be obtained by collating and analyzing large blocks of data has the potential to be a real game changer, one that can

Big Data 269
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

The Digital Risk Reduction Act of 2015

CTOvision

Are you looking for ideas on how to improve the security of federal systems? Cognitio’s founders have been responsible for guarding some of the world’s hardest-to-penetrate networks, including the classified systems that lets case officers in hostile countries communicate with headquarters in the United States, and the networks that provide real-time information to battlefield commanders so they can help save lives in conflict zones.

Security 269
article thumbnail

Thwarting the Risk of Malicious Attacks on Medical Devices

CTOvision

Wearers and users of medical devices may not be aware of their risk of having their device hacked. The software used to operate medical devices is vulnerable to malicious attacks. According to one recent report in particular, the attacks might: impede or alter a device’s function, leak sensitive data, or otherwise cause the device to depart from its specified behavior.

Software 265
article thumbnail

The Solution for ITS and Legacy Messaging: Syndeo

CTOvision

'By Katie Kennedy. Messaging is a critical function for any organization. This is especially true for the Military and Intelligence communities, where it is imperative that vital messages reach intended recipients as quickly as possible. The first messaging system was hand-written notes. While functional, these did not provide a timely way to get a message to a recipient quickly over a long distance, and could be intercepted.

CTO Hire 262
article thumbnail

Simplifying The Overwhelming Cyber Security World For Boards of Directors

CTOvision

'By Bob Gourley. We have previously reported on the great, community coordinated and extensively vetted work on cyber risks and governance by organizations like The Institute of Internal Auditors ( IIA ), The Information Systems Audit and Control Association ( ISACA ),The Internet Security Alliance ( ISA ), and The National Association of Corporate Directors ( NACD ).

Security 262
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.