Predicting the future is hard. We have tried just about every way humanity has come up with, and frankly every model has flaws. But we have found some methods that can be very informative for decision-makers. We look at the megatrends of technology, those unstoppable forces sweeping over us all, and then evaluate current technologies in the light of existing marketplace … [Read more...] about The Future of Enterprise IT: Insights that can drive your decisions today
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
CTOvision is very proud to be a media sponsor of this event. The Women's Society of Cyberjutsu has announced the Wicked6 Cyber Games cybersecurity exhibition and fundraiser will be held at HyperX Esports Arena Las Vegas at the Luxor Hotel and Casino on August 8, 2019 followed by the 6th Annual Cyberjutsu Women's Awards Reception. In this exciting setting, purpose-built for … [Read more...] about Wicked6 Cyber Games: A cybersecurity exhibition at the HyperX Esports Arena Las Vegas 8 Aug 2019
I've known Mike Tanji since 1998 and have had the pleasure of working with him in a variety of capacities since then. Am very proud that he is part of our OODA network and immensely enjoy his special reporting on the cyber threat at OODAloop.com Among Mike Tanji's many superpowers is one I really admire and wish I had. He has a highly developed ability to explain complex … [Read more...] about New Book From Mike Tanji Provides No-Nonsense, Hype Free Guide To Cybersecurity For Small To Midsized Businesses
I've been reading cyber threat intelligence assessments since the beginnings of the digital age. Not sure if I've seen a million of them but it sure seems like I have. I feel like the one I just read by Priscilla Moriuchi at Recorded Future is one of the best and I would like to endorse it to you for your review. You really need to read the full report so I will not really … [Read more...] about Recorded Future Posts Assessment on Geopolitical and Supply Chain Risks From the Huawei Monoculture
Over 2.3 billion files -- including sensitive data like payroll information, credit card details, medical data and patents for intellectual property -- are exposed publicly online, putting both people and organisations at risk of data theft, cybercrime, espionage and other malicious activities. Analysis by researchers at cybersecurity company Digital Shadows found the highly … [Read more...] about Cybersecurity: The number of files exposed on misconfigured servers, storage and cloud services has risen to 2.3 billion