White House Tightens Security for Web Access

security

On Monday, 8 June 2015, Tony Scott, Chief Information Officer for President Obama, issued a memorandum that requires all federal websites and services to switch to HTTPS, a more secure method of connection than plain HTTP, by December 31, 2016.  This change means all traffic is treated as sensitive, rather than leaving it up to web […]

Mitigating The Risk Of Cyber Attacks Against Government Enterprises

risk-analysis-2014

On 15 April 2015, Chris Dorobek hosted a GovLoop discussion between Karen Evans, former CIO of the federal government and currently national director of the US Cyber Challenge, Alan Paller, the highly respected founder and research director of the SANS Institute, and me (Bob Gourley), a student of cyber security and enterprise technology. The topic of […]

List of Cyber Threat “Wake-Up Calls” Growing: Policy makers have been hitting the snooze button since 1970

cybersecurity-skull

The list below is an update to our reference of “Cyber Security Wake-Up Calls.”  What does it take to be on the list? Generally each of the events below was so significant policy makers were loudly proclaiming to all who would listen that they were a wake-up call. This means there are reflections in public […]

CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat

Rear-Admiral-Paul-Becker-Joint-Staff-J2

We recently had the opportunity to interview the Director for Intelligence (J2) for the Joint Chiefs of Staff, RADM Paul Becker, USN. RADM Becker has served in this position since September 2013. The Joint Staff J2 is a position requiring a constant awareness of the day-to-day threats to the nation. Becker had the perfect background […]

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

cybersecurity-skull

Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness. Available data suggest that 84% of corporations have malware on their networks. […]

Now Updated for 2015: The Cyber Threat and the Role of Cyber Intelligence in Defending Your Organization

cybersecurity-skull

The Cyber Threat is a book published to succinctly articulate the nature of the cyber threat in ways designed to help business leaders come to terms with the nature of this phenomenon.  The book is available on Amazon (and is free to Kindle Unlimited subscribers). The book provides a high level overview of cyber threats to business […]