Remove Government Remove Information Security Remove Programming
article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence provided free from governments and academia. Shares information on vulnerabilities via alerts and announcements.

article thumbnail

IntelliDyne’s ITAC Published Top 10 Tech Trends In 2015 For Government Enterprise Infrastructure Management

CTOvision

IntelliDyne’s ITAC is a thought leadership council focused on promoting innovation in Enterprise Infrastructure Management and technology solutions in government, comprised of IntelliDyne senior technologists and enterprise architects. We manage public sector programs that deliver higher operational efficiency and measurable value to clients.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. By Bob Gourley. Here is how they describe them: Autonomic Computing.

article thumbnail

Automation For The Better Good - Security

Forrester IT

Information Security. Security Operations & Program Governance. application security. In the end, you want I&O professionals to be policy enablers, not policy executors - automation helps get us there. Read more Categories: Development & Operations (DevOps). application management.

Security 348
article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. Desired Skills & Experience. MBA or other graduate level degree.

Security 293
article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Cyber Security and the Data Protection Act (acunetix.com). manufacturing program (bizjournals.com). Reception is free.

article thumbnail

Continued Controversy over Smartphone Encryptions

CTOvision

This greater degree of privacy has contributed to a large controversy with the federal government, as law enforcement officials have expressed disapproval of the new encryption. This is absurd,” Mr. Gude writes, “The only actions that have undermined the rule of law are the government’s deceptive and secret mass surveillance programs.”.