2015

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a hacker already knows how to exploit the tech in every way possible.

Thank the cloud for making big data and IoT possible

David Linthicum

I’ve sworn it off: No longer do I remind people younger than myself that many of today’s concepts we call new and innovative are based on much older concepts popular a long time ago -- when I was young. The ones that immediately come to mind are big data and Internet of things (IoT). Big data -- at least the notion of it -- was always the objective in the world of database technology.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

E-Government: A Graduate Class

CIO Musings

It has been 6 months since I posted anything to this blog. Not setting a very good example I am afraid. It has been a busy winter and spring, and I have a lot of material stored up. Now if I just had the time to write! One thing I am working on for this fall that I am very excited about is a class at VCU that is near and dear to me: E-Government.

List of Cyber Threat “Wake-Up Calls” Growing: Policy makers have been hitting the snooze button since 1970

CTOvision

The list below is an update to our reference of "Cyber Security Wake-Up Calls." What does it take to be on the list? Generally each of the events below was so significant policy makers were loudly proclaiming to all who would listen that they were a wake-up call. This means there are reflections in public policy documents, speeches and the press that cite leaders using the phrase. The list below is not all cyber incidents. And the list does not capture the full lessons or nuances of the event.

Facebook Causes Continue to Show Little Promise as Fundraising Tools

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts. The FBI led Internet Crime Complaint Center (IC3) is playing an increasingly important role in helping consumers and victims of fraud know the reality of the threats facing them from cyberspace.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

By Matt Southmayd. Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness. Available data suggest that 84% of corporations have malware on their networks.

More Trending

The President Speaks At Hadoop World: Introduces DJ Patil as Nation’s First Chief Data Scientist

CTOvision

By Bob Gourley. Data science history was made on 19 Feb 2015. For the first time in the history of Hadoop World, the President of the United States gave a keynote. Dwell on that for a bit. This is huge. No matter what your politics is, you really have to agree, this is huge. After the President''s address also see the overview provided by DJ Patil, the new Chief Data Scientist for the federal government.

Data 328

The Technology Related Content of the President’s State of the Union Address (software developers/coders mentioned for first time in any SOTU)

CTOvision

By Bob Gourley. The 2015 State of the Union address was full of technology related content. Here are key takeaways from the perspective of a CTO: The President showed respect for something many American''s may not have heard of, but you dear readers know very well: Coding! In the context of education he remarked that "we’re connecting community colleges with local employers to train workers to fill high-paying jobs like coding, and nursing, and robotics."

Google, like Samsung, is eavesdropping on your private conversations

CTOvision

If you use Google Chrome , you could be subject to eavesdropping by Google. Similar to what Samsung's TVs are doing, the Chromium browser listens to conversations in the vicinity of your laptop, PC, or tablet, and transmits it back to Google. Ostensibly, this is part of the " Google Now " voice activation feature of Chrome. Privacy campaigners and some developers think it's more nefarious.

Google 326

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet itself. He is an engineer's engineer.

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

New DoD Rules For Contractors Focus On Enhancing Security and Incident Response

CTOvision

On 26 August 2015 the Department of Defense (DoD) published a new rule entitled the "Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018). You can read the details of this new rule here: Download “DoD Rules On Protecting Data In Contractor Systems” 26-Aug-Federal-Registrar-New-DoD-Rules-For-Cyber.pdf – Downloaded 8 times – 290 kB.

3 tips to avoid disaster in your cloud migration

David Linthicum

Enterprises are migrating to the cloud in big ways these days. However, the number of moving parts leave many people in IT a bit perplexed -- and fearful that they could be making major mistakes. The reality is that cloud migration is new, so best practices and enabling technologies have yet to emerge. Moreover, there is the added complexity of devops, big data, and the Internet of things. How the heck do you fit those in too?

Devops 315

The Wisdom Of Carl Sagan On Science, Government, and Even Enterprise IT and Digital Risk

CTOvision

Of course you know Carl Sagan the distinguished astronomer and great explainer of science via best selling books and the TV series Cosmos. One of his last interviews was conducted by Charlie Rose in May 1996. The clip below captures a very important message from this discussion, one I think he really nailed for its relevance to the technological world we live in.

NGA and DigitalGlobe Release Powerful Application To Community Under Open Source License

CTOvision

By Bob Gourley. Never doubt that a small group of thoughtful, committed, citizens can change the world. Indeed, it is the only thing that ever has.”. ? Margaret Mead. Editor''s note: I''ve been in the position to observe both NGA and DigitalGlobe as organizations and have also been honored to meet both the two leaders referenced in this release, and I consider their work to be proof yet again that small teams of committed people can work wonders in the world.

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

The Megatrend of Cloud Computing: An update for technology decision-makers

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the first of these trends, Cloud Computing. We succinctly describe Cloud Computing as the scalable delivery of computational resources.

Cloud 322

CTIIC to be a useful agency: Issues addressed by Former Intelligence Community Technology Leaders

CTOvision

By Matt Southmayd. Cybersecurity is one of the most important issues facing organizations today. It is so important that President Obama addressed it 20 January during his State of the Union address. The President talked about the urgent need to ensure that "no foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families, especially our kids."

What Is The Difference Between Data Governance and Big Data Governance?

CTOvision

The video at this link and embedded below starts with a great question: What is the difference between data governance and big data governance? Well we all know that the theory should be that there should be no difference. But the reality is that Hadoop and Spark and the many new approaches around those platforms require more thought and actions to optimize data governance.

Four Ways Big Data is Impacting E-Commerce

CTOvision

From assessing the effectiveness of your current operation and efforts to ensuring that your business has a more complete understanding of the needs of its customers or clients, data aggregation and analysis services have the potential to change the way that merchants and retailers operate in today's increasingly digital marketplace.

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

The Megatrend of Artificial Intelligence: An update for technology decision-makers

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence is the discipline of thinking machines.

CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat

CTOvision

We recently had the opportunity to interview the Director for Intelligence (J2) for the Joint Chiefs of Staff, RADM Paul Becker, USN. RADM Becker has served in this position since September 2013. The Joint Staff J2 is a position requiring a constant awareness of the day-to-day threats to the nation.

Cybersecurity: Too Often Overlooked is the Impact to the Individual

CTOvision

By Matt Southmayd. Recently, there have been questions raised as to why corporations have been slow to be more vigilant about Cybersecurity. In the scheme of a large organization, it is often deprioritized because the minimal impact to the bottom line is a risk that is deemed acceptable to the business. For example, Target’s high profile breach cost the company $264 million dollars which may seem like a significant financial loss.

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

By Bob Gourley. CTOvision is very proud to be a media sponsor of the 4th annual Cloudera Federal Forum. If you are into technology and government and want to find ways to enhance your ability to serve big missions you need to be at this event, 25 Feb at the Hilton McLean Tysons Corner. The Cloudera Federal Forum, now in its 4th year, has always been filled with lessons learned, best practices and informative glimpses into what is coming from the big data tech community.

Intel 322

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

3 ways to screw up a cloud deployment

David Linthicum

Most enterprises do not have the experience or talent to effectively take advantage of private or public cloud resources, so adoption is a trial-and-error process. Even if you use case studies from other enterprises with similar problem domains, you'll still run into issues that are unique to your enterprise, including problems with data integration, governance, and poor application design. From Amazon to Azure, InfoWorld puts IaaS clouds to the test to find out which is best for you.

National Security Software On Wall Street: Cognitio’s Roger Hockenberry Comments

CTOvision

Technology that has been used to hunt terrorists is now gaining traction with Wall Street to enhance customer outcomes, make better decisions and even track down fraud. The Wall Street Journal examined this trend in their piece titled: Spy Software Gets a Second Life on Wall Street. They reported on a wave of companies with ties to the intelligence community "winning over" the world of finance. For us at Cognitio this comes as no surprise.

Don’t Buy A Samsung Smart TV Till You Understand The Threat To Your Business And Personal Information

CTOvision

By Bob Gourley. The fine print offered by Samsung regarding their new Smart TV is something you need to dwell on. Not only does the TV recognize your voice, but it will record your conversations even when you do not know you are being listened to. Additionally, this information will be used by Samsung. And, according to their fine print, may also be used by third-parties they decide to work with. But, they say, don''t worry, they take our privacy very seriously.

The Digital Risk Reduction Act of 2015

CTOvision

Are you looking for ideas on how to improve the security of federal systems? Cognitio’s founders have been responsible for guarding some of the world’s hardest-to-penetrate networks, including the classified systems that lets case officers in hostile countries communicate with headquarters in the United States, and the networks that provide real-time information to battlefield commanders so they can help save lives in conflict zones.

The Complete Guide to Distributed Tracing

Distributed tracing is a diagnostic technique that reveals how a set of services coordinate to handle individual user requests. Distributed tracing helps enable loosely coupled work across teams for fast, independent problem-solving.

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

Editor's note: I was so excited to read of this year's inductees. All are great champions who have given to the community over decades.-bg. BALTIMORE , Sept. 14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland.

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

The chorus of voices declaring the end of anti-virus has reached a deafening pitch. Many of us in the community, myself included, have long said that anti-virus is dead and even a senior VP at Symantec has now admitted such. When the biggest anti-virus vendors, folks who want to perpetuate anti-virus myths for financial reasons, admit anti-virus is dead, it is time to realize anti-virus is a failed approach. It does not stop bad guys and their code.

The Impact of Cloud Robotics on Artificial Intelligence

CTOvision

Look at any science-fiction vision of our technological future and you’ll find a world dominated by artificial intelligence. Some of these visions may go for the more dystopian angle, where humanity has been displaced by self-aware robots that now rule the world. Other, more optimistic views look at AI as a great benefit to our species, helping us in exploration and furthering the advances of scientific endeavors.

Simplifying The Overwhelming Cyber Security World For Boards of Directors

CTOvision

By Bob Gourley. We have previously reported on the great, community coordinated and extensively vetted work on cyber risks and governance by organizations like The Institute of Internal Auditors ( IIA ), The Information Systems Audit and Control Association ( ISACA ),The Internet Security Alliance ( ISA ), and The National Association of Corporate Directors ( NACD ).

Design Thinking for Product Teams: Leverage Human Insight Throughout Development

Product teams must increase their exposure hours with customers—seeing and hearing them. Human insights and the design thinking framework can be applied to your development cycle to help you build better products and experiences for your customers.