CTOvision

Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware

CTOvision

As we usher in the new year of 2018, we are confronted with an ever-expanding network-borne threat landscape especially from ransomware. Ransomware is a type of malicious software which is used by malicious actors to encrypt systems or data. When the ransom is paid the key is in some cases provided to unlock the data. […].

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

Carol M. Evenson. Security breaches can happen to any organization. As more and more companies utilize mobile technology to access and connect with resources the threat of a security breach increases exponentially.

Mobile 127

Trending Sources

Understanding Cloud Computing for Your Business

CTOvision

Carol M. Evenson. Over the last decade, cloud computing has gone from being a buzzword to an essential component of web technology.

2018 Goal: Re-position Cybersecurity As An Enabler

CTOvision

As long as cybersecurity is viewed as a pain, it’ll never be integrated into the fabric of an organization. Fortunately, there have been significant advances in cloud-based security services that enable new ways to embed cybersecurity into enterprise services people want. Ever wonder why dentists re-positioned themselves as teeth whitening experts? Answer: no one likes […]. CTO Cyber Security Mobile News cybersecurity

3 Ways to Mitigate Insider Threat Risk Prior to an Employee’s Departure

CTOvision

We are seeing a disturbing insider threat trend impacting operations and causing reputational harm in the days leading up to an employee’s departure from an organization. For example, last week a Twitter employee deleted President’s Trump’s Twitter account prior to leaving the premises on his last day of employment. In September, a contractor was convicted […]. CTO Cyber Security News Cognitio

Dedrone: Leading provider in airspace security

CTOvision

Dedrone is the leading provider in airspace security. They created the first automated software platform that detects drones and mitigates all known drone threats. They are attracting lots of attention in the security community, as well as from investors.

Hiring Success 2018: All The Confirmed Speakers Attending HR Tech’s Next Big Event

CTOvision

SmartRecruiters’ Hiring Success 2018 is already set to be the defining HR and recruitment conference of the year. Taking place in San Francisco from March 12th-14th, HS18 will consist of numerous workshops, firesides and presentations with some of the foremost speakers, thinkers and innovators in today’s HR space. Below is the current list of confirmed speakers, and we will keep things updated as more speakers and their session plans for HS18 becomes available.

Defense in Depth: Protecting the Organization’s Data

CTOvision

Marty Meehan. Editor's note: in this post, Cognitio's Marty Meehan provides context on an economical, scalable and highly secure defense in depth solution leveraging PKWARE's Smartcrypt and QuintessenceLabs. - The stakes get higher every day.

Executive Order Underscores Need For Leadership Accountability In Reducing Digital Risk

CTOvision

Bob Gourley. The 11 May 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure is notable for several reasons.

What’s The Biggest Data Security Threat In Your Business? The Answer Might Surprise You

CTOvision

William Hayles. As an admin, it’s your job to be paranoid. But you might be worrying about the wrong things. You might be overlooking the biggest threat to your servers. Pick your poison, folks - there’s no shortage of boogeymen in the cybersecurity space.

Cybersecurity Due Diligence: Now a best practice in Merger & Acquisition (M&A)

CTOvision

Bob Gourley. Cooley is an international law firm recognized for its technology practice and experience in multiple practice areas, including Mergers and Acquisition (the firm has handled over 1,000 M&A transactions since 2010).

Update On The Megatrend of CloudComputing

CTOvision

Bob Gourley. There are seven key MegaTrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity.

Big Data in Healthcare Will be the Norm by 2021

CTOvision

As the benefits of big data become more pronounced, this technology is finding a place in an increasing number of industries, not the least of which is the healthcare sector. In fact, some researchers anticipate that big data could become a staple in the way healthcare is administered by as soon as 2121. Let’s take […]. Big Data Health IT healthcare

Cybersecurity Context From Four Top Experts: Rich Baich, Bill Crowell, Anthony J. Ferrante, Jeremy King

CTOvision

CSO Online has just published an interview conducted by Jeremy King where Jeremy pulled together thoughts and inputs from Rich Baich, Bill Crowell and Anthony J. Ferrante. I've tracked these three leaders for years, and have served on boards with Crowell and have witnessed his leadership style and insightful approach to creating workable cyber risk solutions […]. CTO Cyber Security News

Internet of Things: simply put

CTOvision

Michael Johnson. We know you know about the many issues of the Internet of Things, and have provided higher order issues for your consideration here. But with this post we wanted to bring your attention to two videos that are a more simple explanation.

How Your Small Business Can Begin To Use Big Data

CTOvision

While big data can seem like an intimidating term when you are running a small business, it can be a very useful tool to drive your business’s success. Big data, as a term, encompasses many sources of information, some of which you may already use. Big data has many benefits to offer you, from a […]. Big Data CTO News

8 Major Problems Healthcare CIOs are Facing

CTOvision

The role of CIOs is increasingly changing as the business technology undergoes a major shift, making them face a difficult task of incorporating new technology while still retaining ethical standards of the healthcare industry. Below are some of the major challenges faced by CIOs in their efforts of implementing new technology. Security and Privacy While […]. Cloud Computing CTO Cyber Security Health IT News CIOs healthcare

IIoT? IoT? What is the difference?

CTOvision

The Internet of Things As the number of products on the market described as “smart” has grown, “the internet of things” has become something of a buzzword (or buzz phrase). The phrase “internet of things” suggests a network of connected or computerized devices that work together to make life more convenient and simple for the […]. Big Data CTO Internet of Things News IIoT IoT Tech/Internet

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

CTOvision

Nate Crocker. Is AI ready for primetime? Not according to Admiral Michael S. Rogers, Commander U.S. CYBER COMMAND. In a recent interview with Charlie Rose, he stated that machine learning showed great promise for cybersecurity, but that the necessary technology was probably five years out.

Learn The Latest On All Things Data At The 25 April 2017 Cloudera Government Forum

CTOvision

Bob Gourley. In the world of data somethings are totally consistent and some are incredibly dynamic. One timeless consistency is that organizations have always sought to optimize the use of data for their mission. That has always been true and all indications are it always will be.

Big Data Can Be Used for More Than Just Targeting A Customer Base

CTOvision

Brigg Patten. Big data has almost always been primarily used to target clients using tailored products, targeted advertising. This has skewed the use of big data that often everyone simply assumes big data is for targeting the customer base. However, there are many other uses for big data in a firm that may or may not be directly related to customer welfare or marketing purposes. The utilization of data depends on the nature and type of data collected and how well it’s stored and curated.

Voting Machines Hacked at DEF CON in Las Vegas

CTOvision

Just how secure are the nation's voting machines, and how much should you worry about a hacker changing voting results? Based on what a group of hackers in Las Vegas, the machines are easily hacked, and voting results are not secure. Every year, there is a conference held in Las Vegas, called DEF CON, where ethical hackers […]. CTO Cyber Security News cyber cyber security Cybersecurity DEF CON election Hacking technology voting

Why your CTO Makes or Breaks your Enterprise Mobile Strategy

CTOvision

Sunil Thomas. Why your CTO Makes or Breaks your Enterprise Mobile Strategy. For consumers, mobile phone adoption has skyrocketed and smartphone ownership continues to climb in emerging economies.

Mobile 117

The Latest Developments In Corporate Data Security

CTOvision

The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

PBS On: How smart is today’s artificial intelligence?

CTOvision

The video at this link and embedded below captures a 9 minute summary of Artificial Intelligence produced by PBS. It includes good research and video of computers and robots (and even an interview with Ray Kurzweil ). CTO Cyber Security Video News Artificial Intelligence

Big Data Management: A Few Pointers First-Timers Should Remember

CTOvision

There is no doubt about it, data is becoming vital for small and large companies. One of the major reasons data is becoming more important probably deals with its power to save money and optimize performance. Still, to many, using big data is pretty new, so it might be a good idea to consider the following tips […]. Big Data Cloud Computing CTO News Business Tech/Internet Technology Leadership

Curating a Digital Life

CTOvision

Roger Hockenberry. Many times when I speak at conferences I talk about how each of us is now two people. There is first, the analog version of our self and now, with increasing emphasis and importance, our digital self that is leading more and more of an independent life without us. The Analog Self.

Steps for Fortifying Your Organization’s Data in the Cyber War

CTOvision

Roger Hockenberry. The most recent ransomware attacks should make every executive in every company take notice, and be worried. Last week, I spoke at a cyber event and came with a message: the continued focus on legacy endpoint and network security is almost worthless.

Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense

CTOvision

Marty Meehan. Historically, the public sector has focused on a narrow set of cyber threats. Espionage and insider threat were among the primary focus areas given limited public-facing services and air-gapped infrastructure.

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts.

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

The chorus of voices declaring the end of anti-virus has reached a deafening pitch. Many of us in the community, myself included, have long said that anti-virus is dead and even a senior VP at Symantec has now admitted such.

The Megatrend of Cloud Computing: An update for technology decision-makers

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity.

Agile 129

Update On The Megatrend of Cybersecurity

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity.