Viruses or worms haven’t killed anyone – control system cyber incidents have


The prevailing feeling about why there has been so little focus on securing control systems is that it isn’t real. What I constantly hear is “once there is a real control system cyber incident I will spend the time and money to address the problem”. Unfortunately, there have been already been many very significant control […]

CTOvision Now Curating Reference To Cyber Threat Intelligence Companies

CTOvision Pro Research and Advisory Services

CTOvision seeks to provide information that helps enterprise technologists succeed. This includes curated lists of technologies we believe hold the greatest potential of making dramatically positive/virtuous contributions to organizational missions. Since all of us already know the big players in tech, we tend to focus on the smaller but still very capable firms, and now curate […]

Follow-Up on Hackers Taking Over Your Car

2014 Jeep Cherokee Trailhawk

In light of the surfacing cyber vulnerabilities with the Jeep Cherokee, now Chrysler Automobiles is recalling 1.4 million vehicles that could be affected. The vulnerability is in the Chrysler’s 8.4-inch Uconnect touchscreen dashboard computers. For those who fall under the recall specification, you can download the new software from Chrysler, wait for the mailed out […]

eSentire: Active cyberthreat protection solutions mitigate inbound and internal cyberattacks and prevent data exfiltration


With this post we are beginning coverage of eSentire. eSentire protects enterprises with advanced cybersecurity capabilities. eSentire leverages their own threat intelligence and third-party feeds as well as customer data via a high performance analytics platform. This is done in a very cost-effective way which allows most all organizations to benefit from their continuous detection and mitigation […]

OASIS Advances Automated Cyber Threat Intelligence Sharing with STIX, TAXII, CybOX

Bio inspired network security

Editor’s note: We saw the press release below from OASIS and wanted to share it with you since it covers some of the most important information sharing standards in the community today, STIX, TAXII and Cybox. These standards are now being advanced through the open standards process of OASIS. From PRweb OASIS Advances Automated Cyber […]

Hackers Taking Over Your Car

2014 Jeep Cherokee Trailhawk

A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers. Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, […]