The enterprise Chief Technology Officer (CTO) is the whole reason for this site. We appreciate you visiting! Be sure to let us know how we can bring more focus to the site.

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

In the video below, Professor Gene Spafford, Executive Director Emeritus of CERIAS at Perdue, introduces one of the nation’s great digital risk and cybersecurity thinkers, Dr. Ron Ross of NIST, who then provides very important context on what the next generation of cybersecurity and privacy controls need to cover. Ron provides an outstanding overview on the challenges […]

Where CIOs Get the Most Job Satisfaction

Today’s CIOs face a large number of responsibilities and pressures that only seem to be growing with each passing day. Businesses are turning more and more to technology to solve problems, making the CIO’s job all the more important. With all that added pressure to deliver results day in and day out, you might be […]

A Tutorial For Enhancing Your Home DNS Protection

Editor’s note: We are aiming this tutorial at the non-technical person. Please share with anyone in your life who could benefit from this. -bg Have you ever seen a picture of an old fashioned telephone operator? The operator played a critical function in establishing a global telephone network where any phone could talk to any phone. […]

Finding Common Ground with Your CEO

The chief technology officer (CTO) and chief executive officer must work together for the good of the company. The CTO is responsible for focusing on technological matters, such as computers, websites and social networking. The CEO leads the board of directors to make good decisions about company policy and finances. Even if you are a […]

RiskIQ: Tools to Improve Cyber- Situational Understanding in DoD

Operating, securing and defending the Department of Defense Information Network (DoDIN) network and the data traversing through it is inherently a governmental function for the Armed Forces. To accomplish this, DoD has a skilled workforce, empowered with advanced cyber capabilities, which seeks to detect, mitigate and attribute hostile cyber activity within their networks. While much […]

How Big Data is Becoming Smaller Than Small Data

In E-Commerce, Small Data = Big Data and Vice Versa Big Data, small data and everyday data: Is there a meaningful difference between these three information carriers nowadays? The answer by data scientists would be no; some of the information that can be gleaned from Big Data sets these days can also be extracted from […]