article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

Here are a few other snippets from her presentation, but you'll have to register and join to hear her full insightful talk and take in the rest of both days' great speaker lineup. "We Don't miss Kathleen Moriarty's complete presentation, as well as those of other cybersecurity leaders, at our upcoming digital events.

CTO 75
article thumbnail

Possibilities at the Edge: Putting Intelligence Where your Data is

CIO Business Intelligence

The arrival of 5G networks and a boom in connected devices as part of the Industrial Internet of Things (IIoT) will produce vast quantities of real-time data—all of which will need to be rapidly analyzed to inform timely business decisions. This means making a potentially game-changing shift: away from the cloud towards edge computing.

Data 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Vulnerability Found, Exploited, Patched in Internet Explorer

CTOvision

Microsoft acknowledged a zero day vulnerability in Internet Explorer – the default web browser for many computers, laptops, and tablets – in a security advisory released last weekend. Vulnerable Internet Explorers include versions 6, 7, 8, 9, 10, and 11. Help Secure Internet Explorer from Operation Clandestine Fox (groovypost.com).

Internet 253
article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

Ed Steinike , the CIO at Coca-Cola, and Bob Flores , the former CTO of the Central Intelligence Agency (CIA) and a partner at our parent firm Cognitio were the key presenters. Some of the issues discussed include the Internet of things, hacktivists and cyber attacks. Watch the recorded presentation here. Related articles.

article thumbnail

Identity Based Internet Protocol (IBIP): A network security innovation developed at The MITRE Corporation

CTOvision

Over the last several years The MITRE Corporation has published pieces about their development of enhanced security protocols in the construct of Identity-Based Internet Protocol (IBIP). – bg. In February 2014 they published a succinct overview on the topic which you can find at this factsheet.

Internet 270
article thumbnail

What generative AI means for cities: Municipal tech leaders face unique workplace and policy issues

GeekWire

Jim Loter, a longtime tech leader inside the city of Seattle, currently serves as interim chief technology officer. City of Seattle Photo) Jim Loter, interim chief technology officer for the City of Seattle, grappled with these issues as he and his team produced the city’s first generative AI policy this spring.

Policies 117
article thumbnail

CTOvision Named One Of The Top 50 Must-Read IT Blogs In The US

CTOvision

In their words: For the past four years, BizTech has recognized the best and brightest IT blogs in business and we're proud to present this year's list of 50 Must-Read IT Blogs. Some of the blogs on our list are perfect for system administrators while others will appeal to IT managers, such as CIOs and chief technology officers.

CTO 150