• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

  • About
    • Company
    • CTO
    • Events
    • Entertainment
    • Government
    • News
    • Tech Advice
    • Tech Careers
    • The Boardroom
    • Training and Education
    • Quotes
    • Members Only
      • Sign in
  • Tech Guide
    • CTOvision Guide To Technology
    • CTOvision Guide To The Cybersecurity Technology Marketplace
    • National Security Technology
    • Cloud Computing
    • Artificial Intelligence
    • Mobile
    • Blockchain and Cryptocurrency
    • Robots
    • Internet of Things
    • Cyber War
  • Contact Us
  • Newsletters
  • OODA LLC
  • CTO
  • The Migration

Gain Powerful Insights Into The Future With OODA Loop’s Technology Tracking

Bob Gourley April 30, 2022

In a continuation of our journey to bring the best, most actionable technology content to enterprise decision-makers we have merged our research and reporting activities into the OODAloop.com site (both CTOvision.com and OODAloop.com are owned and operated by OODA LLC).

CTOvision will focus only on one small niche, a vision for a technology enabled future. Fuel for anyone who believes, like we do, that open societies must build or die.

The technology reporting of OODA Loop includes daily summaries of technological risk and opportunity, and research driven by our member community into topics required to inform their decisions.

Here is more of what we are up to at OODA Loop:

Use OODA Loop to improve your decision making in any competitive endeavor

Decision Intelligence
The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Stratigames, Business Intelligence and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain.Explore Decision Intelligence
Disruptive/ Exponential Technology
We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. Gain insights into the future of tech in a way that enables optimized action. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, Space Technology.Explore Disruptive/ Exponential Tech
Security and Resiliency
Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation state conflict, non-nation state conflict, global health, international crime, supply chain and terrorism.Explore Security and Resiliency
Community
The OODA community includes a broad group of decision-makers, analysts, entrepreneurs, government leaders and tech creators. Interact with and learn from your peers via the OODA Forum, online monthly meetings, OODA Salons, the OODAcast, in-person conferences and an online forum. For the most sensitive discussions interact with executive leaders via a closed Wickr channel. The community also has access to a member only video library.Explore The OODA Community

Join the OODA Forum

The OODA Forum is a unique place where our community can connect to dialog directly on items of common interest, as well as steer our research and reporting. Visit and ask questions and provide your insights to the community on topics of security, cybersecurity, resiliency, geopolitics and technology. We also use the forum to help keep all in the loop regarding coming events.

See: The OODA Forum




Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: Artificial Intelligence, CTO, News

Gain Decision Advantage With Innovative Enterprise Software

Bob Gourley March 29, 2021

For over 10 years CTOvision has consistently provided strategic context on the nature of technology and how to best leverage it for your personal and business objectives.  We maintain the site in a way meant to help you find insights you need as fast as possible. To kick off a search use the search box in the right column. After entering your search term you will see results in the page plus criteria you can use to narrow your search results.

Track the most disruptive technologies by diving into our categorized index:

Artificial Intelligence Companies – A fast overview of Artificial Intelligence companies we believe are poised to cause the most positive disruption in the enterprise.

Big Data Companies – Reference to the greatest, most disruptive Big Data companies in the tech ecosystem.

Business Intelligence Companies – We assess these to be the Business Intelligence Companies most impactful for delivering real decision advantage.

Cybersecurity Companies – We apply our deep expertise in cybersecurity to assessing the best across multiple categories including:

  • CASB
  • Cyber Threat Intelligence
  • Deception
  • Encryption
  • Endpoint Detection and Response
  • Governance, Training, Education, Process
  • IAM
  • Managed Services, Outsourced Security
  • Microsegmentation and Container Security
  • Network Traffic and Analysis
  • SDP
  • Security Scanning And Testing

Cloud Computing Companies – We include both platform and software as a service providers, capturing only the most innovative and disruptive.

Collaborative Tool Companies – These are the firms that help humans connect to humans to create, manage and lead.

Infrastructure Companies – Critical enterprise foundations for business agility.

IoT Companies – Internet of Things and Industrial Internet of Things are here. How do you manage them?

Mobile Companies – Help manage, configure, secure and optimize these very powerful capabilities.

Robotics Companies – Including innovations in Robotic Process Automation, Drones, and industrial robotics.

Services Companies – We only track a few, the ones we really know well.

Tech Titans – These are the big players. We track the tech titans closely since their capabilities change continuously.

VC, PE and Finance Companies – Keeping an eye on the investors can give indications of coming developments.

You can also use our topical pages to get up to speed quickly on the current status of the major megatrends. See our pages on Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, Cybersecurity and Blockchain and Cryptocurrencies.

We also provide special pages focused on high interest topics, including Science Fiction, Entertainment, Cyber War, Tech Careers, Training and Education and Tech Tips.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: CTO, Featured

Mitigating Advanced Threats with Scalable and Automated Malware Analysis: An interview of Chad Loeven and Mike Hylton

Bob Gourley January 9, 2022

Mitigating Advanced Threats with Scalable and Automated Malware Analysis: An interview of Chad Loeven and Mike Hylton

Scalable automated malware analysis has become a critical component of enterprise defense. When properly implemented it can be key to mitigating malware threats that otherwise bypass perimeter defenses. In this post we provide context enterprise architects and security engineers can use to dramatically scale their ability to conduct malware analysis. It is based on an interview with two widely known experts in the federal cybersecurity community, Mike Hylton and Chad Loeven.

Chad is the VP Malware Analysis Sales for OPSWAT. He joined OPSWAT to lead the Malware Analysis go to market initiative, following OPSWAT’s acquisition of SNDBOX and its malware analyzer technology. Prior to OPSWAT, Chad spent over 14 years in the malware analysis field, bringing the first commercial automated malware analyzer to market in 2007. He also ran technology alliances for RSA, where he came on board as part of RSA’s acquisition of Silicium Security and their ECAT EDR (Endpoint Discovery and Response) technology.

Mike leads government business for OPSWAT. He is a sought-after expert on Zero-Trust security and the use of Zero-Trust technologies to mitigate advanced cyber threats. Mike has a background of over 20 years in federal technology consulting with the Pentagon and other federal agencies. Mike also has extensive international experience, as well as experience with cybersecurity startups. On top of that, we have found him to be a great explainer of tech, which will come through in the discussion below:

Q: Chad for context can you give us your views on how malware analysis has evolved over the last decade? I’m especially interested in the concept of a sandbox in malware analysis:

I’m dating myself that it’s actually a decade and a half since I started in the sandbox field. Our CEO and CTO had gone to a research conference where a young German Masters student in Comp Sci presented his thesis on automating file analysis. Our CEO approached him and asked if our company could have the commercial rights to his project. The student said sure as I think at the time, he didn’t believe there was any market as such. I was tasked (“voluntold”) by the CEO with figuring out who would buy it and turning a collection of code with no user interface or documentation into a product. I was despairing of the futility of the task when Google contacted us out of the blue and said they needed to buy it, no questions asked. I walked into the CEO’s office and said, “You know how you wanted me to find a way to sell that German Masters’ thesis as a product? I found our first customer.” After that a dam broke, especially in the Federal sector as they all became aware of how nation-state threat actors could craft custom malware that could trivially bypass existing defenses. Keep in mind that at the time virtually all defenses (AV, firewalls etc) were relying almost exclusively on signatures. So, if the threat wasn’t defined in the vendor’s signature database, it went straight through as the dirty secret was that most security vendors had a default-allow approach for anything they couldn’t identify. As a result, doing a dynamic behavioral analysis of an unknown file (a.k.a. sandboxing) was the only effective way to determine if that unknown file was in fact malicious and what it would do if it got onto the targeted systems.

Q: Mike as I interact with government tech leaders, I find most are familiar with the sandbox concept, but many are not up to speed on what a modern sandbox is capable of. Would you agree? What would you most like government tech leaders to know about modern sandbox capabilities?

Generally speaking, government tech leaders are familiar and perhaps even using sandboxes as part of their incident response program. Traditionally, sandboxes provide IR teams the capability to delve deeper into a small subset of files for dynamic analysis or detonation to examine behaviors of the file.

Emerging best practices and technologies are becoming more centered on automation, scale, and resiliency as the industry wrestles with both a shortage of talent and increasing threats by advanced threat actors. OPSWAT’s acquisition of SNDBOX, a leading malware analysis sandbox for critical infrastructure, allows for the integration of high-efficacy detection of known malware with aggregation of COTS Anti-Malware engines and an ultra-fast, AI-driven sandbox that is designed for high scale throughput.

Now, government tech leaders can create a customizable and systematic workflow that ingests files from standardized integration points, runs them through 20+ scanning engines, and then take any remaining indeterminate files into our highly efficient and scalable sandbox or an array of sandboxes with various target environments. This means that identifying malware no longer needs to be solely used for IR. Now, identifying malware can be shifted into earlier stages of threat prevention before it becomes an incident.

Q: Chad I recently read a paper you authored that discussed a need to adopt a threat focused information security program. As a security practitioner that really resonated with me. Can you provide a little context on what you meant by that and why it is important?

The idea is that compliance is a necessary but not sufficient condition on the path to security maturity and being in a place where an organization can truly be proactive in both pre-empting threats and responding in a timely manner before damage is done. To get to that level of maturity, that requires a set of capabilities that mature organizations must put in place, including a Threat Intelligence Platform (TIP) with threat management capabilities, real-time SOC monitoring, threat hunting, and targeting analysis i.e. risk assessments from an adversary’s perspective. There are no shortcuts, and it really requires a commitment from the top of the organization to move past the basics.

Q: Chad what makes OPSWAT’s malware analyzer solution of interest to the modern enterprise?

We’ve come a long way in 14 years. Sandboxing is now commoditized and is integral to many security solutions. Having dynamic behavioral analysis through sandboxing as part of your defence in depth is a big step forward. However, traditional sandboxes have their own limitations. Chief among them is speed and scalability. As Mike mentioned, by making sandboxing fast and scalable, it can move to the front lines and be used proactively. That’s important because we no longer have the luxury of doing incident response days or weeks after an attacker has gained a foothold. Ransomware changes everything. It was bad enough before that a nation-state actor could have free reign and exfiltrate sensitive data for days or weeks before being discovered. Ransomware means the attack window must be shut down almost immediately or the organization may be unable to function.

Q: Mike how do you describe that solution in the context of government mission needs?

The government mission and the supporting technology are fascinating because of the multitude of use-cases, nuances of systems, and security requirements, not to mention the country’s mission. Consistent with government missions related to technology is the need for high levels of accuracy, speed, scale, and standard operating procedures. OPSWAT’s automated malware analysis platform can bring the precision of identifying known malware and unknown malware with speed and scale to existing frameworks and systems.

For example, government missions and their supporting technology range from critical infrastructure, services, and R&D systems and have fundamental cybersecurity objectives that require fresh thinking on file-level protection. From protecting sensitive personally identifiable information (PII) to maintaining operational resiliency, applying a thorough review of files coming in from external sources, partners, suppliers, and even internal segmented networks should incorporate best practices from ZTA.

Q: Mike How does this solution fit in in the zero-trust framework?

Zero-Trust often gets dismissed in some technical circles as “just the latest marketing term,” however, a key concept of zero-trust is not implying or extending trust to an asset simply because its inside the perimeter or authenticated. By validating beyond traditional security controls, such as reviewing the posture of a file before allowing access, zero-trust becomes a critical design approach in defense in depth.This approach can now be applied to files in motion or at rest by performing deep analysis for malware, sensitive data, IOCS and known vulnerable binaries.

If you recall from our last conversation on secure working from home (WFH), we have a platform which extends zero-trust to devices by validating key parameters such as integrity and posture as part of the authentication procedure to systems behind the firewall or externally hosted services. Files that interact with these systems and endpoints can be uploaded into MetaDefender Platform for processing, such as when removable is interested on a remote machine.

Q: Chad how long does it take to implement a scalable malware analysis solution for an enterprise?

That’s an open-ended question. There’s a lot of variables there, starting with what are the internal resources and skills available, and what integrations are required. We’ve put a lot of thought into making our own solutions easy to deploy and easy for a junior analyst to get up to speed quickly. It’s a safe assumption that most organizations, public or private, are under-resourced in their SOC, not just in total headcount, but an especially acute shortage of senior experienced threat analysts. So, it’s critically important that tools like ours deployed in a SOC can make junior analysts productive and effective with a very short learning curve.

Q: Mike in your experience, how many government agencies have dedicated malware analysis teams:

Most government organizations have an essential internal capability for malware analysis, often relying on external 3rd parties to determine definitive answers on identification, payload, and any adverse effects. Adding advanced malware automation internally to an organization reduces dependencies to external organizations. It enables more files to be systematically reviewed and tailored for each unique environment (operating system configuration and application-specific nuances).

Q: Chad how do you describe the skills gap around malware analysis? Does your solution do anything to address those issues?

You may have seen recently that the federal government lifted salary caps for cybersecurity workers so that some could end up earning more than the vice president. Even then, it will be a struggle to maintain a skilled workforce when massively funded cybersecurity unicorns and the FAANGs are all competing for the same small talent pool. As a result, organizations draw into their cybersecurity operations staff from adjacent roles – IT ops, helpdesk and the like. They need to ramp up quickly and be able to learn on the fly how to tackle incidents effectively.

We saw a real-world example of what can happen when an under-funded public sector agency gets attacked by ransomware when the Irish public health system was brought down. They were to their credit remarkably open and willing to share the lessons learned about what went wrong: Krebs on Security

The key takeaways were:

  • They had an antiquated, unpatched array of assets (many Win 7 workstations)
  • They had insufficient internal resources and were over-reliant on outsourced security services.
  • The outsourcers had no integration or automated escalation processes with their internal processes.
  • The alerts were generated for days that an attack was underway. But the response was too late, and inadequate.
  • The MSP *emailed* the end user about the unresolved threats just the day before the files were encrypted.

We should be wary of thinking there are magic bullets out there, but it’s also clear that if you have manual processes involving multiple external parties, you have a window of vulnerability attackers will exploit.

Concluding comment: We will be addressing these and related topics on 20 January in a panel hosted by Carahsoft. For more and to join us see:

https://carahevents.carahsoft.com/Event/Details/262206-OPSWAT

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: CTO, Featured, News Tagged With: Carahsoft, cto, Opswat, sandbox

CTOvision and OODA: Big Changes Coming Soon

Bob Gourley September 21, 2021

In a continuation of our journey to bring the best, most actionable technology content to enterprise decision-makers we are merging our research and reporting activities into the OODAloop.com site (both CTOvision.com and OODAloop.com are owned and operated by OODA LLC).

This will give our community access to the same technology summaries we currently produce as well as deeper content on cybersecurity and geopolitical risks and deeper insights into tech surprise that can inform your strategic decision-making.

We will be transitioning our directory of disruptive technologies to the OODAloop platform as well to enable a better experience for our readers, and expect the full transition to be complete by the end of September 2021.

Thank you for being a CTOvision reader! Please keep the feedback coming during this transition.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: CTO

Cloudera Introduces Cloudera DataFlow for the Public Cloud

Research August 19, 2021

Cloudera, the enterprise data cloud company, today announced the launch of Cloudera DataFlow for the Public Cloud, a cloud-native service for data flows to process hybrid streaming workloads on the Cloudera Data Platform (CDP). With Cloudera DataFlow for the Public Cloud, users can now automate complex data flow operations, boost the operational efficiency of streaming data flows with auto-scaling capabilities, and cut down on cloud costs by eliminating infrastructure sizing guesswork.

Read more about Cloudera’s newly launched Cloudera DataFlow for the Public Cloud, a cloud-native service for data flows to process hybrid streaming workloads on the Cloudera Data Platform (CDP) on Cision.

For more see : Cloudera.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: Cloudera

Sam Tawfik at Immuta Discusses the Importance of Automation for Data Sharing in Today’s Cloud Environments

Research August 19, 2021

In today’s interconnected, data-driven world, secure data sharing is paramount to inter-company data sharing and driving new revenue sources by monetizing essential data assets. But with organizations adopting multiple cloud data platforms to enable self-service data access, adhering to data sharing rules and agreements while maintaining universal cloud data access control is often complicated and uncertain.

Read/hear the webinar of DBTA with Sam Tawfik, director, product marketing, Immuta who discussed the biggest challenges data teams face in sharing data, and their ramifications on Database Trends and Applications.

For more see : Immuta, Inc.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: Immuta, Immuta Inc

Roblox, Facebook See the ‘Metaverse’ as Key to the Internet’s Next Phase

Research August 19, 2021

Read Meghan Bobrowsky explain why Facebook and Roblox see The Metaverse as the key to the Internet’s next phase on Wall Street Journal :

A new tech-industry battle is taking shape over the “metaverse” as companies such as Facebook Inc. and Roblox Corp. work to shape a virtual realm that most consumers don’t yet know exists. The metaverse concept, rooted in science-fiction novels such as “Snow Crash” and “Ready Player One,” encompasses an extensive online world transcending individual tech platforms, where people exist in immersive, shared virtual spaces. Through avatars, people would be able to try on items available in stores or attend concerts with friends, just as they would offline.

Read her full article here.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: Metaverse, The Metaverse

Palantir Stockpiles Gold To Hedge Against Future ‘Black Swan’ Events

Research August 19, 2021

Palantir Technologies (NYSE”PLTR) says it is preparing for another “black swan event” by stockpiling gold bars and inviting customers to pay for its data analysis software in gold. The company has spent $50.7 million U.S. on gold, part of an unusual investment strategy that also includes blank-cheque companies and Bitcoin. Palantir had previously said it would accept Bitcoin as a form of payment before adding gold more recently.

Read why Palantir Technologies, Inc. is worried about future Black Swan events and how it is stockpiling gold bars to mitigate such risks on Baystreet.

For more see : Palantir Technologies, Inc.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: Palantir, Palantir Technologies

Palantir: The Next Big Player In Enterprise Data

Research August 16, 2021

Read why Aayra Aamer, Rohan George, Rinnah Sanders, and Humna Sheikh say that Palantir Technologies, Inc.’s future is bright as more and more businesses transition to artificial intelligence backed big data working environments on Seeking Alpha :

In a world where technology is advancing faster than ever, it is not outlandish to see life imitate art occasionally. Looking at its wide range of accomplishments over the past few years, Palantir (PLTR) seems like something straight out of a movie. The reality is that it is helping to reroute companies as we continue transitioning into the IoT (Internet of Things) era. According to Forbes, 32% of IT budgets will be committed to the Cloud this year.

Read their full article here.

For more see : Palantir Technologies, Inc.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: Palantir, Palantir Technologies

Elastic updates Elastic Stack and Elastic Cloud to make data onboarding and management more secure

Research August 16, 2021

Elastic announces new capabilities and updates to the Elastic Stack and Elastic Cloud to make data onboarding and management faster, simpler, and more secure. The general availability of Elastic Agent, centrally managed by Fleet, enables users and customers to integrate data across multiple data sources while also providing endpoint security. Elastic Agent serves as the single unified agent to accelerate the onboarding and managing of new data sources while Fleet centrally manages all Elastic Agents, making installing and updating integrations and protections straightforward.

Read how Elastic NV is making Elastic Stack and Elastic Cloud easier and secure for data onboarding and management through centrally Fleet on Helpnet Security.

For more see : Elastic NV aka Elasticsearch.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: Elastic, Elasticsearch

Ether trading volumes surpass bitcoin on Coinbase for the first time as DeFi and staking hype grows

Research August 16, 2021

Ether was the most-traded cryptocurrency on Coinbase in the second quarter of the year, jumping ahead of bitcoin as excitement grew around decentralized finance and staking – two use cases that have drawn investors to the world’s second-biggest cryptocurrency. Trading in ether made up 26% of total volumes in the second quarter, up from 21% in the previous three months, Coinbase’s second-quarter earnings showed on Tuesday.

Read how Coinbase’s second-quarter earnings show that Ethereum has surpassed Bitcoin in volumes even as De-Fi and staking get more popular on Market Insider.

For more see : Ethereum and Bitcoin.

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Filed Under: News Tagged With: bitcoin, Ethereum

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 191
  • Go to Next Page »

Primary Sidebar

Footer

OODA LLC Technology Due Diligence
OODAloop.com

Free Newsletters and Tech Reports

CTOs on Facebook
CTOs on LinkedIn

CTO Events
Tech Guide

Copyright © 2022 ·News Pro · Genesis Framework by StudioPress · WordPress · Log in