Alex Gibney is an Academy Award winning filmmaker who has now turned his sights to one of the most significant events in modern cyber conflict, the creation of software designed to execute on a mission of incredible stakes. If this software succeeded it held the promise of avoiding a large scale conventional war which could […]
There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity.
Cyber Security is far more than just protecting data. Security is about protecting the functionality of IT. It involves confidentiality, availability and integrity of resources. This higher order approach to cyber security requires vision, leadership, and actions in dimensions of people, process and technology.
RiskIQ’s PassiveTotal leverages the power of a well engineered sensor network and high power/high performance computing, and highly experienced analysts to help enterprise executives proactively block or otherwise disrupt malicious infrastructure. PassiveTotal is designed to provide analysts with a single view into all the data they need. It is also designed to be easy to […]
In the second article of how CTO’s can create a framework for enterprises to adopt mobile for growth we look at one of the early decisions to be made – that is choosing to build native apps or adopt the responsive web. In case you missed it, the previous article in the series discusses why […]
A few weeks ago I had the pleasure of sitting down for a regular breakfast with Ed Scheidt, former head of CIA’s Cryptographic Center and the designer of the cyrpto systems used in the Kryptos Sculpture at the Agency. He and I get together and typically it’s a free-ranging discussion that covers a lot of […]
Passive DNS has become one of the most powerful tools in the defenders arsenal. The concept was created in 2004 to help mitigate the threat of malware but is now used for that and far more use cases. Passive DNS data can be used to help detect when trojans have infiltrated your system and are […]
Network Toolbox may be the best network app on in the Apple App Store. It is designed for both iPhone and iPad and if you are an enterprise IT professional or just a technology enthusiast it belongs on your iOS device. The Toolbox contains a suite of 32 tools that will help you analyze networks […]