More stories

  • Women in Cybersecurity: Reducing the Gender Gap Part I

    This post is the first in a three part series on the Women in Cybersecurity Conference. On March 31st through April 2nd, women from academia, government, and industry from around the globe gathered in Dallas, Texas for Women in Cybersecurity (WiCyS) Conference. This three-day long event was designed to both enhance the state of cyber […] More

  • Fast-Start DevOps FedRAMP Based Solution

    CMA has announced their launch of a Fast-Start DevOps (Platform)-as-a-Service [DaaS] solution through the CMA NIH CIO-CS Government-Wide Acquisition Contract (GWAC). This solution integrates Red Hat’s OpenShift open source PaaS with NTT Data’s value-added professional services and BlackMesh’s FedRAMP compliant hosting infrastructure.  The result is a DevOps environment that streamlines the rapid development and deployment of new […] More

  • Top 100 Influencers In Artificial Intelligence and Machine Learning

    Artificial Intelligence is the discipline of thinking machines. It has been a field of growing interest since 1955 when John McCarthy first coined the term, defining it as “the science and engineering of making intelligent machines.” The largest players in technology today, including Google, Facebook, Amazon, Microsoft and Apple, are all investing heavily in Artificial Intelligence. […] More

  • QuintessenceLabs Unveils their Trusted Security Foundation (TSF)

    It is clear that one of the most important challenges we face as a nation is cybersecurity. To help address this issue, the administration has created a and promulgated a Cybersecurity National Action Plan (CNAP). The key point of this plan is that citizens need tools to protect themselves, companies must defend their operations and information, and […] More

  • Bob Gourley Named One of the Top 100 Big Data Influencers

    Bob Gourley, publisher of CTOvision, has been named one of the “Top 100 Influencers in the Big Data Landscape” by the leading force in influencer identification Onalytica. Onalytica used their influencer identification software to review individuals engaging in meaty, useful, relevant conversations on Big Data via Twitter to create this list. From their website: The Big […] More

  • Harnessing the Power of Quantum Science

    The growing gap between existing cybersecurity solutions and the sophistication of hacks is well known and has been widely publicized. Instead of just incremental catch-up activities, there is a push toward strengthening the overall security foundation within organizations. One such approach is through a new generation of security innovators who are harnessing the power of […] More

  • SAP NS2 Solutions Summit Highlights

    On October 29th, SAP had their 4th Annual SAP NS2 Solutions Summit. This event featured SAP’s Mark Testoni, President George W. Bush, ADM Michael Rogers, Michael Morell, Teresa Carlson and our own Bob Gourley. Watch the video below to see the highlights from this event. It is not quite as good as having been there, but […] More

  • Advancing Cybersecurity Innovation with QuintessenceLabs

    In a world of increasing cyber-hacks and threats, it is vital to provide strong protection for sensitive information. CEO and board-level demand have been the driving force behind new technology innovations to protect corporate networks and data. This is matched by rapidly increasing investments in cybersecurity startups, with companies and venture capital firms pouring money […] More

  • NSA Recommendations Include High Entropy and Longer Keys to Protect Against Quantum Computer Developments

    Currently, the NSA’s Information Assurance Directorate (IAD) only uses approved Suite B cryptographic algorithms, specified by the National Institute of Standards and Technology (NIST), to protect classified and unclassified National Security Systems (NSS). The Suite B algorithms have served as a method to ensure the security of classified and unclassified information through public networks. Now, […] More

  • Why the U.S. National Strategic Computing Initiative (NSCI) Matters

    The post below, by Kristin Hansen with Bright Computing,  highlights IDC HPC User Forum’s panel discussions on the U.S. National Strategic Computing Initiative (NSCI). The NSCI was created by an executive order on July 29th. NSCI defines a military agency framework for furthering U.S. “economic competitiveness and scientific discovery” through orchestrated advances in high performance computing […] More

  • Follow-Up on Hackers Taking Over Your Car

    In light of the surfacing cyber vulnerabilities with the Jeep Cherokee, now Chrysler Automobiles is recalling 1.4 million vehicles that could be affected. The vulnerability is in the Chrysler’s 8.4-inch Uconnect touchscreen dashboard computers. For those who fall under the recall specification, you can download the new software from Chrysler, wait for the mailed out […] More

Load More
Congratulations. You've reached the end of the internet.