article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Track sessions will focus on: Enabling Business Results with Big Data — How to enable agency programs that will yield enormous value through big data to deliver actionable information and measureable results. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera.

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Track sessions will focus on: Enabling Business Results with Big Data — How to enable agency programs that will yield enormous value through big data to deliver actionable information and measureable results. Chief Security Architect, Office of the CTO, Cloudera. Chief Security Architect, Office of the CTO, Cloudera.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

A file-less intrusion is one where intruders leverages programs already on the host (e.g., browsers, Office applications, and Windows utilities) to achieve their objectives. PCworld on Macrobased Malware. Microsoft on Macro Malware. Trendmicro on Macro Malware. See: Security Ledger on Fessleak.

Malware 150
article thumbnail

The Problem That CIOs Have With Windows Software

The Accidental Successful CIO

There is a fundamental weakness in the architecture of the Windows platform, which seems to make it particularly vulnerable to malware. What they have learned is that the fundamental weakness in Microsoft software that is attracting the hackers lies in its application programming interfaces (APIs). – Dr. Jim Anderson.

Windows 100
article thumbnail

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

Available data suggest that 84% of corporations have malware on their networks. This post provides the views of the leadership team of Cognitio Corp , a consultancy with experience defending both government and commercial enterprises. However, this only closes a door that has already been opened and exploited. About Cognitio.

Insurance 150
article thumbnail

CIO-Application security: the 3 pillars of securing your engineering ecosystem

CIO Business Intelligence

The infamous Solar Winds attack occurred because a build system was exploited, and malware was spread to 18,000 clients. After an extensive service in Israel’s Unit 8200, Daniel held multiple positions in the AppSec domain spanning across offensive, defensive and consulting positions.

article thumbnail

The Sony Hack in Context

CTOvision

If the US is ever forced to confront a major power such as Russia or China on their turf or adjacent seas, and the information technology that underpins this high-tech approach to warfare is compromised, disaster could follow. CTO cyber conflict cyberattack Cybersecurity' Regrettably this is already happening.