DDOS Trends Report 2016


The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. In Q2 2016, Verisign observed an increase of 75 percent in DDoS attack activity year over year. Cyber SecurityMarty Meehan.

Trends 233

TechNet Augusta 2016: Defensive Cyber


CTO Cyber Security DOD News CentOS Linux Linux distribution Linux kernel Red Hat Red Hat Enterprise Linux Software repository SUSE Linux distributionsChrisScott. This is the sixth in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet.

Linux 325

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Introducing The Forrester Wave™: Digital Risk Monitoring, Q3 2016

Forrester IT

We recently published our Forrester Wave™: Digital Risk Monitoring, Q3 2016 report. Social Media Security. Digital Governance Digital Risk Digital Risk Monitoring HUMINT OSINT Risk Intelligence Security and Risk Social Media Security forrester wave

Mobile 333

Top 10 IT security stories of 2016

Computer Weekly

Here are Computer Weekly’s top 10 IT security stories of 2016

How Far has Face-Tracking Technology Come in 2016?


Where do you think face-tracking technology will go towards the end of 2016? Artificial Intelligence Computer securityEllie Martin.

Election Impact 2016: 10 Nov on Capital Hill


CG Roll Call is hosting Election Impact 2016 on 10 Nov at the Hyatt Regency Washington on Capitol Hill. CTO Cyber Security Events News Cognitio Computer securityMichael Johnson. This event is an opportunity to hear directly from leaders in DC on the impact of the Congressional and Presidential elections, including diving deep into topics like cybersecurity, healthcare, defense, energy, technology and budgets.

A Chat with Jeh Johnson, Secretary of Homeland Security, at the July 2016 Aspen Forum


In his final months in office, the Secretary of Homeland Security Jeh Johnson gives us his assessment of the state of the nation’s security. CTO Cyber Security News Video Jeh Johnson United States Secretary of Homeland SecurityMichael Johnson.

The Cyber Threat updated for 2016: Kindle version provided free 22, 23, 24 June 2016


Thanks to Amazon.com we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special three day promotion running 22, 23 and 24 June 2016. Big Data Cloud Computing CTO Cyber Security Interesting Books NewsBob Gourley.

The 2016 Forrester Data Privacy Heatmap Points To Continued EU Influence On Global Regulations

Forrester IT

To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and practices for 54 different countries. Earlier today, we published the 2016 version to the tool , as well as a free version with limited access. The slow global convergence toward the requirements outlined in the regulation continued through 2016.

Data 279

TechNet Augusta 2016: US Army Networks and Services


The first was an overview you can find at: TechNet Augusta 2016 “ Cyber in the Combined Arms Fight ”. CTO Cyber Security DOD Government News Denial-of-service attack Electromagnetic weapon Electronic warfare United States ArmyChrisScott.

Microsegmentation – Secure Your Internal Network


Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Mobile Application Security in 2016


And how do you feel about the security of the apps you install? Arxan recently did a 5th annual State of Application Security report, which takes an in-depth look into the security of some of the most popular mobile health and mobile finance applications available.

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas


Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

2016 Internet of Things (IoT) Predictions


To help IoT solution providers define their 2016 product roadmap, here are some of INSIDE Secure’s top IoT predictions for the year: IoT hype will become reality. In 2016 there will be a growing number of authentic success stories where the IoT provides real value to consumers and enterprises. As a result, data privacy threats, like Ransomware, will extend to IoT devices, which collect personal information, but lack appropriate security features. Trevor Daughney.

Meet Cognitio’s Bob Flores In Australia at Connect Expo April 19-20, 2016


Bob is participating in Australia's Connect Expo 19-20 April 2016. Bob will be part of the Fireside chat: Tackling the data security and privacy challenges of the IoT, with. CTO Cyber Security Events Internet of Things News Australia Central Intelligence Agency Connect Expo technology

Registration Open For The 4 Oct 2016 Synergy Forum: CTOvision readers can save 10%


The Second Annual Synergy Forum will be held 4 October 2016 at the Renaissance Washington, DC Downtown Hotel. October 4, 2016. CTO Cyber Security Events Internet of Things News Trends Cognitio SynergyBob Gourley.

Hotels 260

Recovering From a Security Breach


There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

Contrast Security


Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

2016: A systems security disaster

Network World

This will likely make you angry. It made me livid. . It’s a report, 34 pages long, from the Identity Theft Resource Center of the known systems breaches just this year. Read it and rage. . It does not include the San Francisco Metro Transit Authority (SFMTA) hack from Thanksgiving weekend , where the SFMTA had to let passengers go free through the gates. To read this article in full or to leave a comment, please click here

System 112

Arizona Technology Council Holds Cybersecurity Summit 5 May 2016: Roger Hockenberry Keynotes


You can take steps to reduce your digital risk and enhance security. The Cybersecurity Summit is an opportunity for government and business executives to learn about the threats, vulnerabilities, and consequences related to data security and privacy matters. Thursday May 5, 2016.

Top Technology News for 27 June 2016


Rumored 2016 MacBook Pro, 5K Display, iPhone 7 Could Provide Excitement - Forbes. Week in Review: Most popular stories on GeekWire for the week of June 19, 2016. Intel weighs sale of cyber security business (Financial Times). Week in Review: Most popular stories on GeekWire for the week of June 19, 2016. Charles Hall. What's more popular than pizza for drone delivery? For prisoners, it's drugs, tobacco, rolling papers, and porn!

Budget 174

Learn The Cyber Threat 31 March 2016 at 10am EDT in Threat Brief Webinar


On Thursday 31 March 2016 join Cognitio for an overview of the threat in a fast-paced, action-oriented webinar designed to extract meaningful lessons learned and provide you with actionable insights. Analysis Big Data CTO Cyber Security NewsBob Gourley.

RiskIQ Accelerates Momentum Across Entire External Threat Management Solution Set in First Half of 2016


We track RiskIQ in our Security Companies Directory -bg. RiskIQ Accelerates Momentum Across Entire External Threat Management Solution Set in First Half of 2016. RiskIQ helps Facebook detect and block threats planted in third-party ads that violate our policies and can put people at risk," said Jennifer Henley, Facebook's director of security operations. RiskIQ continues to receive significant recognition based on its security product innovations. Bob Gourley.

A Flicker Of Light: A new security stack points the path to safety


Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

Cognitio and ThreatBrief in People Magazine: Security tips for the general public


We help enterprises build action plans to mitigate risks and improve their security posture. Every person with a computer or phone has information at risk and should take personal responsibility for improving their security posture. CTO Cyber Security NewsBob Gourley.

Dr. Chaos Security Podcast – May 8th, 2016

Doctor Chaos

Click here for Audio only version Story 1: Virus Total closing down vendors that do not share: [link] Information sharing in the industry is a good thing, but what do you to keep things fair? Story 2: Drunk Uber Girl We will keep this to 5 minutes. This will be on […]. Podcast podcast

Tech News Review 19 July 2016


By Steven Norton Jul 18, 2016 7:32 pm ET Artificial intelligence is approximating human reasoning more and more closely all the time. A new cloud environment for business-to-business networks announced by IBM last week will allow companies to test performance, privacy, and interoperability of their blockchain ecosystems within a secure environment, the company said. Cisco Launches Cloud-Based Security Portfolio . Bob Gourley.

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers


Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

QuintessenceLabs Unveils their Trusted Security Foundation (TSF)


QuintessenceLabs is fielding practical answers to cyber security challenges in ways that are directly supporting the goals of this plan as well as the real world practical needs of organizations across government and industry. Their Trusted Security Foundation (TSF) is the first key manager that integrates quantum true random for the strongest keys, and the security of an HSM, and that integrates seamlessly into existing architectures. Katie Kennedy.

TechNet Augusta 2016 “Cyber in the Combined Arms Fight”


The prevailing theme of the presentations and discussions was how to provide secure networks in times of war. Army is seeking ways to securely combine cyber and kinetic effects to achieve military advantages. They are pursuing ways to use cyber security and cyber situational awareness in real time, and in an automated manner that can respond and react at machine speed, self-diagnosing and self-healing. Secure digital fires. Privacy vs. security. ChrisScott.

Naturally Better Security: Leveraging the power of nature to enhance Internet security


Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. The escalation of these attacks in 2016 is raising fears that cyberattacks against electoral systems will threaten democracy itself. Current approaches are all variants of a security theme from the 1990’s called “Defense in Depth,” where security is layered on at every point in the IT stack.

InterConnect 2016: IBM’s Examination Of All Things Cloud, AI, Mobility, Big Data, Robotics, IoT, Cyber


InterConnect 2016 is 21-25 February at the MGM Grand & Mandalay Bay in Las Vegas (side note: this event attracts so many forward thinking technologists and business leaders that there are very few venues large enough to hold it). Big Data Cloud Computing CTO Cyber Security Events Mobile News IBMBob Gourley.

IBM 200

Why a Reactive Security Strategy Costs Companies Millions Each Year


With each new threat, digital security companies are learning to react more quickly and put out countermeasures for these malicious programs, but in the time between a piece of malware’s release into the wild and the release of the solution, it can cost companies a staggering amount of money.

Top Technology News Ticker for 3 June 2016


News Android CTO cyber Disruptive IT Enterprise Facebook Security Tech/Internet technology Technology Leadership The FutureCharles Hall. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): BMW revamps R&D for new era of self-driving cars. Colossal golf-course alligator gets brilliant 'Jurassic Park' remix - CNET.

Hotels 183

Android Security Bulletin November 2016: What you need to know

Tech Republic Security

Get the highlights of the November 2016 bulletin The Android Mediaserver is back in the critical column for vulnerabilities.

Could Your Next Security Analyst Be A Computer?

Forrester IT

We depend on the knowledge of our security analysts to recognize and stop threats. Analysts may also look outside the organization at threat intelligence feeds, security blogs, social media sites, threat reports and other resources for information. Security analysts are expensive resources. That means that some security incidents are never investigated, leaving gaps in threat detection. This is not new information for security pros. data security.

Simulated cyber attack in London adds finalists to 2016 UK Cyber Security Challenge

Computer Weekly

Ten would-be cyber warriors head to the final of the UK Cyber Security Challenge after showing off their skills to prospective employers in dealing with a simulated cyber attack

Unlock the next level of cloud security

David Linthicum

I’m often asked about cloud security best practices, and my answer is always the same: It depends on what you want to protect in the cloud. Indeed, the security services you’ll find in the cloud are about as good as they get in IT. Discover how to secure your systems with InfoWorld's Security newsletter. ]. But putting all security bets aside, the best way to protect your application in the public cloud is to actively watch it.

Dr. Chaos Security Podcast – April 18th, 2016 – Dark Web

Doctor Chaos

Dark Web expert Julien Savoie discusses what is the Dark Web, Dark Net markets, and gives insight into the current threats and technology that make up the Dark Web. Join us as Julien Savoie demystifies the Dark Web.

.Net 130

Institute of World Politics Holds Unique Cyber Intelligence Initiative Event 24 May 2016


The Institute of World Politics is an independent graduate school formed to fill a major national security need: the need for greater professional education in statecraft, national security and international affairs. Cyber Security: Why Is This (Still) So Hard? Bob Gourley.

RSA 2016: Key Takeaways

The Investing Edge

San Francisco buzzed with security vendors, buyers and investors as they crowded the lobbies of hotels and coffee shops with endless meetings. Events Security & Compliance cybersecurity Enterprise IT Security

Improve Deployment Speed and Reduce Overhead with Containers in Windows Server 2016

IT Pros Rock!

Learn how containers work in Windows Server 2016 and how they can be used to increase deployment speed, workload density and decrease server overhead to create a more efficient IT environment. Introduction to Windows Server 2016 Containers. [ 7:31 ] What about security?

Amazing List Of Government and Industry Thought Leaders Gathering At Cloudera Federal Forum 15 March 2016


The 5th Annual Cloudera Federal Forum will be held 15 March 2016. Chief Security Architect, Cloudera. Bob Gourley. For more and to register see: [link].