More stories

  • cyber war is a cage fight

    Cyberwar Is Now A 3-Way Cage Fight

    The past few weeks has seen aggressive action by the White House against Russia and China.  Cyberwar has become a 3-way cage fight.  Here’s a quick review of the fight and tactics to improve. US Strategy Not Working: Hit Me, I Can Take It Data exfiltration by Kaspersky and Huawei have been known for years […] More

  • Changing Government Requirement For Market Research to Continuous Market Assessment

    During interview today with I’ll be discussing an observation many of us in the enterprise technology community have been discussing lately. There is a growing consensus in the enterprise tech community (CIO, CTO, CISO) regarding the Cambrian Explosion of great capabilities in the tech sector. Although this is an incredibly exciting time to be an […] More

  • Fast-Start DevOps FedRAMP Based Solution

    CMA has announced their launch of a Fast-Start DevOps (Platform)-as-a-Service [DaaS] solution through the CMA NIH CIO-CS Government-Wide Acquisition Contract (GWAC). This solution integrates Red Hat’s OpenShift open source PaaS with NTT Data’s value-added professional services and BlackMesh’s FedRAMP compliant hosting infrastructure.  The result is a DevOps environment that streamlines the rapid development and deployment of new […] More

  • What You Need To Know About The Administration’s Cybersecurity National Action Plan

    The Whitehouse released a plan on 9 Feb 2016 that should be read and understood by cybersecurity professionals everywhere. Here is my take on the most important point: Whoever you are, wherever you are, you need to understand you are responsible for defending your technology. Do not think that you can abdicate or delegate this responsibility. […] More

  • A Sea Change in Europe Leaves No Shelter in the Harbor

    Editor’s note: we asked Toby Duthie and Lukas Bartusevicius of Forensic Risk Alliance to provide context on the dynamics underway in the European Union now that a court has  declared Safe Harbor invalid. Their context is below. – bg Introduction In a landmark decision on the 6th of October, the Court of Justice of the […] More

  • 7012 Regs and Cyber insurance on collision course with small business

    Editor’s note: This post first appeared at and is republished here with the permission of the author. – bg Part One: What are the “7012” regulations? Defense Acquisition Regulation Supplement 252.204-7012 In November 2013, the US Department of Defense issued final rules to its defense acquisition regulations. Defense Acquisition Regulation Supplement (DFARS) section 252.204-7012 […] More

  • CIA CIO Doug Wolfe Interviewed on C2S

    CTOvision Interviews CIA CIO Doug Wolfe on Commercial Cloud Services (C2S) Lessons Learned and Road Ahead

    We recently had the opportunity to interview the CIA CIO, Doug Wolfe. Doug has been the CIA’s CIO since 2013. In this role he oversees the agency information technology vision and strategic direction. He is also an advisor to the intelligence community CIO and a collaborative leader in the federal technology world. His past tours […] More

  • Fresh Insights into the NSA’s Cyber Capabilities

    It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American allies. A recent report from Russian researchers has provided more specific […] More

  • Insider’s Guide to the New Holographic Computing

    Editor’s note: we saw this post on Lewis Shepherd’s blog ( and requested Lewis share it with you here. -bg In my seven happy years at Microsoft before leaving a couple of months ago, I was never happier than when I was involved in a cool “secret project.” Last year my team and I contributed for […] More

  • The Drone Terrorism Case That Wasn’t

    Fears related to drone safety, in particular concerns about so-called “near misses” with manned aircraft, have gotten a lot of attention in recent weeks. More detailed analysis, however, has shown those fears to have been greatly exaggerated. Nonetheless, they have resulted in one senator’s call for an expansion of the FAA’s drone ban to include […] More

  • Scale and Speed with Cyber Security

    “Sometimes quantity has a quality all its own” attributed to Stalin & Clausewitz Operational scale doesn’t get much love or discussion from folks since its boring to talk about: truly large scale things have been simplified and optimized to do a few very specific things extremely well. Things like packet routing, cell phone switching, stock […] More

Load More
Congratulations. You've reached the end of the internet.