New White Paper, “The Public Sector Improves Security and Efficiency with Hadoop”, Available in Research Library

Interested in using Hadoop in the federal space?  A white paper has been added to the CTOVision Research Library which showcases several use cases for improving security and efficiency for government agencies using Hadoop. Use Cases are grouped together into two main themes: IT Efficiency and Good Government practices. IT Efficiency covers offloading ETL to […]

Federal Cyber Security Best Practices Session with Rick Howard, CSO, Palo Alto Networks


Palo Alto Networks is sponsoring a Federal Cyber Security Best Practices session on Thursday, March 19, 2015, from 11:30 AM to 1:30 PM ET, with Rick Howard, Chief Security Officer for Palo Alto Networks.  The event will be held at Arrow Electronics, 7067 Columbia Gateway Drive, Suite 100, Columbia, MD 21046.  This is a chance […]

Great Global Brand Seeks Mission Focused CISO: Please help with networking


One of America’s most recognized brands, a firm that touches people around the globe, is conducting a confidential search for a CISO. A friend has asked me to keep my eyes and ears open to send names along if I know of a good fit. I love to be helpful to both sides of the […]

The Open Web Application Security Project (OWASP): An online community with a virtuous goal


One of our CTOvision Pro subscribers requested we provide more context on web based and mobile application security and referenced the good work underway by OWASP. Over the next few weeks we will be publishing more on this topic, but wanted to start with an introduction to OWASP itself. It is an open community we hold in […]

Your Enterprise has too many Cyber-ish People

Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-side. Sitting through a number of presentations at various […]

We Are Living In The Age of the Mega-Breach

Screen Shot 2014-12-12 at 10.57.01 AM

Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses.  Their April 2014 report has proven to be particularly insightful, foreshadowing many of the events seen from that month to today.   For example, in 2012, there were 156 major data breaches increasing to 253 in […]