My sincere hope is that one of our CTOvision readers is selected for a position that Facebook has just advertised for. The job, titled a Public Policy Manager for Cybersecurity Threat Disruption, is a recognition that the companies we trust with our data should, and will, play greater roles in protecting our data, including leaning forward and being proactive in thwarting … [Read more...] about Facebook Seeks A Public Policy Manager, Cybersecurity Threat Disruption
The past few weeks has seen aggressive action by the White House against Russia and China. Cyberwar has become a 3-way cage fight. Here's a quick review of the fight and tactics to improve. US Strategy Not Working: Hit Me, I Can Take It Data exfiltration by Kaspersky and Huawei have been known for years among US cybersecurity researchers. However US government took the … [Read more...] about Cyberwar Is Now A 3-Way Cage Fight
On March 21, 2018 the New York Times reported that the White House was going to take aggressive action against China for illegal trade practices as well as intellectual property theft. The administration is right to do so. Drive thru middle America and you’ll see closed factories whose products are now manufactured in China. For the past few decades China has implemented an … [Read more...] about White House Takes Action Against Chinese Intellectual Property Theft
Perhaps you’ve decided to emphasize productivity more than ever in your workplace and want to know whether it’s legal to use software that tracks how employees use their computers. Below, we’ll investigate the laws surrounding that issue and why you might want to see what employees do — or fail to do — as well as introduce three monitoring tools to try. The Basics of the Legal … [Read more...] about 3 Software Programs That Let Businesses Monitor Employees’ Computers
On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets into a compute device via … [Read more...] about Are you ready for state-sponsored zombie malware attacks?