2014

Remove page t
article thumbnail

Initial Assessment on NIST Coordinated Framework for Improving Critical Infrastructure Cybersecurity

CTOvision

You''re unauthorized to view this page. Why don''t you Login and try again. Analysis Cyber Security Research Big Data cio CISO CTO cyber DHS'

CTO 288
article thumbnail

Fixmo: The Mobile Risk Management Company

CTOvision

You''re unauthorized to view this page. Why don''t you Login and try again. Company Mobile Companies Security Companies'

Mobile 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

7 Common mistakes in Go and when to avoid them

SPF13

Passes Implementation Details Down The Stack func (p *Page) Plain() string { return helpers.StripHTML(string(p.Content)) }. func (p *Page) Plain() string { return helpers.StripHTML(p.Content()) } Implementation Details Abstracted With A Method. Mistake 2: Thinking Of Errors As Strings. Mistake 6: Not Using Io.Reader & Io.Writer.

Examples 260
article thumbnail

Analysts, Tools, and Complexity

CTOvision

We often (wrongly) treat terms like “uncertain,” “difficult,” and “complex” as interchangeable — when, as economist Scott Page points out , the differences between them are instructive. Page has a useful distinction between all of these that can help us match tool to problem.

Tools 263
article thumbnail

NIST Issues Draft Guide To Cyber Threat Information Sharing

CTOvision

Although I love the reference to standards on the last page, I’m thinking a paragraph or two on OVAL, SCAP, STIX, TAXII and VERIS could be helpful to enterprise IT professionals. I don’t mind telling you, it is also helping my firm ( Cognitio ) continue to enhance our cybersecurity offerings.

CTO 283
article thumbnail

The Three Most Common Myths in Enterprise Security

CTOvision

Don’t act surprised. If you haven’t patched your software, then the conventional wisdom is you are negligent (by corporate governance, compliance, and reputationally) in your job. So why can’t we patch our way to security? That doesn’t even cover all the Java 1.5, Notice that Java 1.7x

article thumbnail

How do you define the CIO role?

Eric D. Brown

After reading that, I had to check the calendar to make sure that I didn’t invent a time-machine and travel back to the 1970′s. The only logical answer I could come up with was that someone in Gartner’s web content team forgot to update that particular page sometime in the last century.

Travel 173