article thumbnail

Tech Trends in 2014: Actionable Insights For Your Career

CTOvision

Drawing from her 20+ years of recruitment experience across financial services, technology, healthcare, biotech, professional services, and the Internet space, Lenzner has some interesting perspectives about top trends. Q: In your opinion what are the Top 5 anticipated tech trends for 2014? As data breaches brought the U.S.

Trends 255
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before commercial industry found the Internet. Dr. Richard Marshall, Esq.,

Software 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech accelerator for Washington and Oregon startups encourages underserved applicants

GeekWire

The free and virtual 10-week program, funded by the U.S. Devon Horace , director of the RAIN Tech Accelerator, said the program is accepting 50 applicants, and is encouraging underserved women and BIPOC founders and rural-based startups to apply.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies. Jim Byrom , Program Manager, Disaster Recovery, IRS. RADM Robert E. Coast Guard. Wolf Tombe , CTO, U.S.

Symantec 261
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Lewis and Dr. Rhonda Anderson of the ODNI National Intelligence Council will be moderating a panel of Dr Chris Reed (IARPA), Mr. Mark White (Deloitte) and myself on topics of the Internet of Things and its implication for intelligence. Deputy Director for Intelligence for Strategic Programs. Deputy Program Manager. Arlette Hart.

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 A Self-Sovereign Internet. technologies. DID Communications Protocol.

article thumbnail

Security attacks and countermeasures

Cloud Musings

Cyber attacks are on the increase, with six of the top 10 largest incidents occurring in 2013 (402M) and 2014 (469M to date) [1]. For example, in the first half of 2014, 84.6% MINIMIZING OR AVERTING ATTACKS The best protection against malware includes anti-malware and Internet security software. from the government.

Security 159