There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud ComputingArtificial IntelligenceMobilityBig DataRoboticsInternet of ThingsCyberSecurity.
hacking-detected-shutterstock_188832089
Cyber Security is far more than just protecting data. Security is about protecting the functionality of IT. It involves confidentiality, availability and integrity of resources. This higher order approach to cyber security requires vision, leadership, and actions in dimensions of people, process and technology.

 

 

Zero Days by Alex Gibney: A documentary examining a watershed event in cyber conflict

Alex Gibney is an Academy Award winning filmmaker who has now turned his sights to one of the most significant events in modern cyber conflict, the creation of software designed to execute on a mission of incredible stakes. If this software succeeded it held the promise of avoiding a large scale conventional war which could […]

Discovering and proactively blocking malicious infrastructure

RiskIQ’s PassiveTotal leverages the power of a well engineered sensor network and high power/high performance computing, and highly experienced analysts to help enterprise executives proactively block or otherwise disrupt malicious infrastructure. PassiveTotal is designed to provide analysts with a single view into all the data they need. It is also designed to be easy to […]

How to choose between Native Apps or the Responsive Web?

In the second article of how CTO’s can create a framework for enterprises to adopt mobile for growth we look at one of the early decisions to be made – that is choosing to build native apps or adopt the responsive web. In case you missed it, the previous article in the series discusses why […]

The State of Digital Currency: A discussion with Ed Scheidt

A few weeks ago I had the pleasure of sitting down for a regular breakfast with Ed Scheidt, former head of CIA’s Cryptographic Center and the designer of the cyrpto systems used in the Kryptos Sculpture at the Agency. He and I get together and typically it’s a free-ranging discussion that covers a lot of […]

What is Passive DNS and how do you leverage it in research?

Passive DNS has become one of the most powerful tools in the defenders arsenal. The concept was created in 2004 to help mitigate the threat of malware but is now used for that and far more use cases. Passive DNS data can be used to help detect when trojans have infiltrated your system and are […]

NetworkToolbox- Network scanning and analyzing

Network Toolbox may be the best network app on in the Apple App Store. It is designed for both iPhone and iPad and if you are an enterprise IT professional or just a technology enthusiast it belongs on your iOS device. The Toolbox contains a suite of 32 tools that will help you analyze networks […]