Moving Toward a Framework for Resilient Cybersecurity: Orchestrating Responses to Threats

This post was written by Cognitio and sponsored by Verisign. In the previous blog posts, we highlighted the role that threat intelligence plays in the development of a framework for resilient cybersecurity, as well as the importance of a solutions based approach when it comes to security tool selection. Together these capabilities will help organizations identify and […]

Updating the CTOvision Assessments of the Megatrends of IT

We organize and report on the megatrends of enterprise IT in seven major categories. You can easily remember these categories by the simple mnemonic acronym Cambric. Cambric stands for: Cloud Computing Artificial Intelligence Mobility Big Data Robotics Internet of Things CyberSecurity Advances in these seven technologies are closely interrelated. Individually they are important and will […]

Moving Toward a Framework for Resilient Cybersecurity: Designing for Security and Flexibility

This post was written by Cognitio and sponsored by Verisign. So far in our quest to establish a framework for resilient cybersecurity we have talked about the importance of understanding and evaluating the threat landscape. Specifically, we highlighted the advantage of context focused threat intelligence and the value it can add to quickly and proactively detect and […]

Cognitio’s Bob Flores and Roger Hockenberry On Cyber Risk

Cognitio’s Bob Flores and Roger Hockenberry are widely known for their ability to articulate what is important about the cyber threat and the digital risks to the modern organization. The clip below shows both Bob and Roger in action, succinctly articulating what business leaders need to know about the nature of digital risk in the […]

Moving Toward a Framework for Resilient Cybersecurity: Evaluating the Threat Landscape

This post was written by Cognitio and sponsored by Verisign. In this previous post on The Need for a Framework for Resilient Cybersecurity we highlighted that the increasing diversity and sophistication of today’s IT environments is driving a need for organizations to implement a framework for resilient cybersecurity. In this post we will focus on one of the […]

The Best Practices are No Longer the “Best” Practices

Editors note: This is a sponsored post provided by Cray. There was a time when information systems security was much simpler. It focused on the appropriate time frame to take a sample of a one-dimensional system log that tracked events like blocked traffic, virus detection, and machines taken off-line. In this day and age, breaches, […]