article thumbnail

SINET Announces 2015 Top 16 Emerging Cybersecurity Companies

CTOvision

Winners to Introduce Innovative Technologies at SINET Showcase in Washington, DC, November 3 & 4, 2015. The selected companies will share their work with buyers, builders, investors and researchers during the SINET Showcase on Nov 3 & 4, 2015 at the National Press Club in Washington, DC. ABOUT THE 2015 SINET 16 INNOVATORS.

Company 150
article thumbnail

Overview of the Security Innovation Network (SINET) Showcase 16 Innovators

CTOvision

The capstone event of SINET is their yearly innovation showcase in Washington DC , the last of which was held 3 and 4 Nov 2015. 2015 SINET 16 Innovators: Bayshore Networks, Inc. BehavioSec – Disruptive verification & authentication solutions that make consumers part of the security solution, rather than the problem.

Network 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

1 area of spending increase in 2015, with nearly half (46%) planning to invest more in access control, intrusion prevention, and virus and malware protection. Multi-factor authentication for both cloud-based accounts and on-premise Active Directory will now be part of Windows, rather needing a hardware solution to complete.

Windows 150
article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

Release Date: Mon May 25 2015 00:00:00 GMT-0400 (EDT). Example case studies demonstrate how the book’s material is immediately applicable to your use cases. Title: Hadoop Security. Author: Ben Spivey, Joey Echeverria, Genre: Computers. Publisher: Oreilly & Associates Incorporated. Pages: 330.

Security 150
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

On Tuesday, January 27, 2015 CTOvision publisher and Cognitio Corp co-founder Bob Gourley hosted an event for federal big data professionals. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

Agencies were instructed to immediately patch critical vulnerabilities, review and tightly limit the number of privileged users with access to authorized systems and dramatically accelerate the use of strong authentication, especially for privileged users. Jackson 2015 ) Follow me at [link].

Dell 70
article thumbnail

What a quarter century of digital transformation at PayPal looks like

CIO Business Intelligence

We grew hand in hand with eBay and have continued to do so after separating in 2015.” These applications live on innumerable servers, yet some technology is hosted in the public cloud. “eBay saw the opportunity to welcome us into their fold and, eventually, we were acquired, becoming their official payment service,” Shivananda adds. “We