eSentire Appoints Bob Gourley To Advisory Board

Editor’s note: I am very proud to be associated with eSentire in this way. They are a tremendous firm providing businesses with cybersecurity capabilities they would not otherwise have, including an ability to tap into an always on team of experts. -bg The following is from the press release at eSentire. eSentire Appoints Cybersecurity Veteran […]

Determining Who Should Be in Charge of Cyber Security

Security has quickly transformed into a major issue for most businesses. As headlines highlight the now common incidents of security breaches, where victims as large as Target, JPMorgan Chase, and Sony have to struggle to repair the damage, many companies are prioritizing their cyber security needs, hoping to avoid becoming the next victim of a […]

4th Annual SAP NS2 Solutions Summit

SAP’s annual Solutions Summit is an opportunity to engage and lead the dialogue that is grounded in perspectives from national security leaders such as yourself, on critical issues facing the U.S. national security community.  The theme this year is “Human Critical: Empowering the People that Drive U.S. National Security,” and the objective is to honor the men and […]

Good People at @SecureNinja Provide Cyber Kung Fu Certified Ethical Hacker Course Free

SecureNinja has been a force for good in the community for years, providing education and training and contributing to many online and in person events and activities (including FedCyber). We have always loved these guys. But there is something I totally missed till now that I wish I would have brought to your attention long […]

Kicking the Tires: Verisign DNS Firewall

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an existing environment couldn’t be more seamless, configuration and management are a breeze, and it delivers immediate benefit to the security posture of any […]

Hackers Taking Over Your Car

A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers. Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, […]