A Users Guide To CTOvision Pro

deeplearning

CTOvision Pro is a subscription based research and analysis service that provides information you can not get from any other source (if you have not tried it yet you may sign up for a free evaluation trial here).  This post provides tips on how to make the most of this information resource. We start with some general […]

Work-Bench Security Summit 30 Sep in NYC: Invite-only, but here is how to get engaged and invited

workbench

Work-Bench is a technology accelerator. Specifically they accelerate enterprise technologies, which makes them especially interesting. This group should be tracked closely by any enterprise technologist. Sign up for their newsletter here and follow them on Twitter at @work_bench. Work-Bench articulates what they do like this: We scale enterprise technology companies by providing community and workspace, […]

30 July Analyst Forum: Incredible Agenda And Even Greater Attendees

shutterstock_115491706

We are now two days away from the 30 July Analyst Forum, an event we organized with our partners at the United States Geospatial Intelligence Foundation (USGIF). Now that I have seen the most recent list of attendees coming to the forum I am more excited than ever. Although we have a a great agenda, […]

White Paper: Automating Your Cyber Defenses Including Malware Removal

automatingmalwareremoval

Threat actors are increasingly automating their attacks, making defense harder and overwhelming incident response teams. Defenders have long looked to automated discovery as a means to mitigate this threat, but until recently, mass automation and response/threat removal hasn’t been a viable option. With changes in technology, enterprise cyber security professionals can now leverage automated in-line […]

Register for 12 Jun 2014 Webinar: Automated Removal of Advanced Threats

internet-of-things-2

If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Odds are you have concluded that the only way to mitigate the threat is through automation. Right? Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at […]

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

securitypadlock-360x200

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tailor this reporting in a twice weekly CISO Technology Report. This […]