Best Practices for Federal DNS Security

Domain Name Systems are the core of every Federal network. Malicious actors depend on DNS to maneuver within systems and steal critical information – a whopping 91.3% of cyberattacks use DNS. With advanced persistent threats a growing trend, DNS security is a fundamental mission of every Federal IT security professional. BlueCat is providing a webinar […]

Are you ready for state-sponsored zombie malware attacks?

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]

Leveraging Social Media to Expand Business Data Globally

Social media has become an integral part of society, and having a presence on these platforms is a must for businesses in the present world. Barely a decade ago, only a small proportion of the globe were exposed to social media. A few years later, the list of social media networks has continued to grow […]

Registration for the O’Reilly Strata Data Conference in New York 2017

Strata Data Conference | September 25–28, 2017| New York, NY Cutting-edge science and new business fundamentals intersect and merge at Strata Data Conference. It’s a deep-immersion event where data scientists, analysts, and executives get up to speed on emerging techniques and technologies by dissecting case studies, developing new skills, and sharing emerging best practices. Strata Data […]

How Cybersecurity Benefits from Hackers

With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word. Private individuals who are worried their identities will be stolen—or who have […]

What’s in Store for the Big Data and Security Debate

Data is becoming an increasingly important component of business models and marketing mixes. As a result of this, we are seeing the emergence of a culture of data collection that is startlingly creative and in some cases, arguably invasive. In the current data-obsessed business and tech environment, almost anything anyone does can be quantified and […]