CTOvision

3 Ways to Mitigate Insider Threat Risk Prior to an Employee’s Departure

CTOvision

We are seeing a disturbing insider threat trend impacting operations and causing reputational harm in the days leading up to an employee’s departure from an organization. For example, last week a Twitter employee deleted President’s Trump’s Twitter account prior to leaving the premises on his last day of employment. In September, a contractor was convicted […]. CTO Cyber Security News Cognitio

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

Carol M. Evenson. Security breaches can happen to any organization. As more and more companies utilize mobile technology to access and connect with resources the threat of a security breach increases exponentially.

Mobile 127

Trending Sources

Understanding Cloud Computing for Your Business

CTOvision

Carol M. Evenson. Over the last decade, cloud computing has gone from being a buzzword to an essential component of web technology.

Seven Trends and Predictions for 2017

CTOvision

Nathaniel Crocker. Seven Trends and Predictions for 2017. In billiards, you must call your shot ahead of time. You don’t get any points for luck. With that in mind, here are my on-the-record predictions for 2017. Trend #1 – Self Driving Cars.

Trends 121

Big Data in Healthcare Will be the Norm by 2021

CTOvision

As the benefits of big data become more pronounced, this technology is finding a place in an increasing number of industries, not the least of which is the healthcare sector. In fact, some researchers anticipate that big data could become a staple in the way healthcare is administered by as soon as 2121. Let’s take […]. Big Data Health IT healthcare

Cybersecurity Due Diligence: Now a best practice in Merger & Acquisition (M&A)

CTOvision

Bob Gourley. Cooley is an international law firm recognized for its technology practice and experience in multiple practice areas, including Mergers and Acquisition (the firm has handled over 1,000 M&A transactions since 2010).

How Your Small Business Can Begin To Use Big Data

CTOvision

While big data can seem like an intimidating term when you are running a small business, it can be a very useful tool to drive your business’s success. Big data, as a term, encompasses many sources of information, some of which you may already use. Big data has many benefits to offer you, from a […]. Big Data CTO News

8 Major Problems Healthcare CIOs are Facing

CTOvision

The role of CIOs is increasingly changing as the business technology undergoes a major shift, making them face a difficult task of incorporating new technology while still retaining ethical standards of the healthcare industry. Below are some of the major challenges faced by CIOs in their efforts of implementing new technology. Security and Privacy While […]. Cloud Computing CTO Cyber Security Health IT News CIOs healthcare

Voting Machines Hacked at DEF CON in Las Vegas

CTOvision

Just how secure are the nation's voting machines, and how much should you worry about a hacker changing voting results? Based on what a group of hackers in Las Vegas, the machines are easily hacked, and voting results are not secure. Every year, there is a conference held in Las Vegas, called DEF CON, where ethical hackers […]. CTO Cyber Security News cyber cyber security Cybersecurity DEF CON election Hacking technology voting

Update On The Megatrend of CloudComputing

CTOvision

Bob Gourley. There are seven key MegaTrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity.

IIoT? IoT? What is the difference?

CTOvision

The Internet of Things As the number of products on the market described as “smart” has grown, “the internet of things” has become something of a buzzword (or buzz phrase). The phrase “internet of things” suggests a network of connected or computerized devices that work together to make life more convenient and simple for the […]. Big Data CTO Internet of Things News IIoT IoT Tech/Internet

Big Data Management: A Few Pointers First-Timers Should Remember

CTOvision

There is no doubt about it, data is becoming vital for small and large companies. One of the major reasons data is becoming more important probably deals with its power to save money and optimize performance. Still, to many, using big data is pretty new, so it might be a good idea to consider the following tips […]. Big Data Cloud Computing CTO News Business Tech/Internet Technology Leadership

What’s The Biggest Data Security Threat In Your Business? The Answer Might Surprise You

CTOvision

William Hayles. As an admin, it’s your job to be paranoid. But you might be worrying about the wrong things. You might be overlooking the biggest threat to your servers. Pick your poison, folks - there’s no shortage of boogeymen in the cybersecurity space.

How Does Ireland Measure Up as a Location for Starting Your European Engineering Team?

CTOvision

Editor's note: This guest post by Alan McGlinchey makes a good case for why Ireland should be considered as the location for your European engineering team. Would love to see similar articles submitted for other locations, but so far it seems Alan is building a very compelling case! -bg bg Europe is a vast, lucrative market […].

The Latest Developments In Corporate Data Security

CTOvision

The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […]. Big Data CTO Cyber Security

Learn The Latest On All Things Data At The 25 April 2017 Cloudera Government Forum

CTOvision

Bob Gourley. In the world of data somethings are totally consistent and some are incredibly dynamic. One timeless consistency is that organizations have always sought to optimize the use of data for their mission. That has always been true and all indications are it always will be.

Big Data Can Be Used for More Than Just Targeting A Customer Base

CTOvision

Brigg Patten. Big data has almost always been primarily used to target clients using tailored products, targeted advertising. This has skewed the use of big data that often everyone simply assumes big data is for targeting the customer base. However, there are many other uses for big data in a firm that may or may not be directly related to customer welfare or marketing purposes. The utilization of data depends on the nature and type of data collected and how well it’s stored and curated.

Internet of Things: simply put

CTOvision

Michael Johnson. We know you know about the many issues of the Internet of Things, and have provided higher order issues for your consideration here. But with this post we wanted to bring your attention to two videos that are a more simple explanation.

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

CTOvision

Nate Crocker. Is AI ready for primetime? Not according to Admiral Michael S. Rogers, Commander U.S. CYBER COMMAND. In a recent interview with Charlie Rose, he stated that machine learning showed great promise for cybersecurity, but that the necessary technology was probably five years out.

Transforming the PMO into an SVMO to Drive Software Value

CTOvision

The role of the Project Management Office (PMO) has been to define and maintain standards for projects – an important business function for most organizations. In the software development world, the PMO has made significant headway over the years in standardizing processes to ensure projects are executed successfully. While the PMO has been vital in […]. CTO News

 FBI vs Apple: History, Policy, Sovereignty and Individual Rights

CTOvision

Editor’s note: This is the third in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security. For a detailed legal analysis accompanying the article, please visit TheCyberLawTeam.com/publications-1 […].

Steps for Fortifying Your Organization’s Data in the Cyber War

CTOvision

Roger Hockenberry. The most recent ransomware attacks should make every executive in every company take notice, and be worried. Last week, I spoke at a cyber event and came with a message: the continued focus on legacy endpoint and network security is almost worthless.

FBI vs Apple: Policy Analysis

CTOvision

Editor’s note: This is the second in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security.-bg bg Despite foreboding tales of doom associated with the potential outcome on each […]. CTO Cyber Security News

Why your CTO Makes or Breaks your Enterprise Mobile Strategy

CTOvision

Sunil Thomas. Why your CTO Makes or Breaks your Enterprise Mobile Strategy. For consumers, mobile phone adoption has skyrocketed and smartphone ownership continues to climb in emerging economies.

Mobile 117

Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense

CTOvision

Marty Meehan. Historically, the public sector has focused on a narrow set of cyber threats. Espionage and insider threat were among the primary focus areas given limited public-facing services and air-gapped infrastructure.

Curating a Digital Life

CTOvision

Roger Hockenberry. Many times when I speak at conferences I talk about how each of us is now two people. There is first, the analog version of our self and now, with increasing emphasis and importance, our digital self that is leading more and more of an independent life without us. The Analog Self.

Update On The Megatrend of Cybersecurity

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity.

PBS On: How smart is today’s artificial intelligence?

CTOvision

The video at this link and embedded below captures a 9 minute summary of Artificial Intelligence produced by PBS. It includes good research and video of computers and robots (and even an interview with Ray Kurzweil ). CTO Cyber Security Video News Artificial Intelligence

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

The chorus of voices declaring the end of anti-virus has reached a deafening pitch. Many of us in the community, myself included, have long said that anti-virus is dead and even a senior VP at Symantec has now admitted such.

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts.

The State of Digital Currency: A discussion with Ed Scheidt

CTOvision

Roger Hockenberry. A few weeks ago I had the pleasure of sitting down for a regular breakfast with Ed Scheidt , former head of CIA’s Cryptographic Center and the designer of the cyrpto systems used in the Kryptos Sculpture at the Agency.

How Cybersecurity Benefits from Hackers

CTOvision

Carol M. Evenson. With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word.