Researchers Say Google Fiber Has Nationwide Potential

CTOvision

Bernstein Research, an equ. CTO Cyber Security DoD and IC Government Research Tech Trends Comcast Federal Communications Commission Google Google Fiber Internet service provider Net neutrality Sanford Bernstein Wall Street

Virginia Announces Research Commercialization Awards

CTOvision

The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8

Trending Sources

Researchers find gaps in IoT security

Network World

Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question: “What are the new intellectual challenges in the science of security when we talk about the Internet of Things, and what problems can we solve using currently known security techniques?”.

Accelerating Cancer Research Using a Big Data Approach

CTOvision

New to the CTOvision research library , Cray's Solution Brief "Accelerating Cancer Research Using a Big Data Approach." In this brief, Cray address the challenge for cancer researchers and offers a solution. A hypothesis from cancer researchers is that big data could be used to identify new drug treatments from data already available through the analysis of gene-drug relationships. Big Data CTO Health IT Cancer Research Cray Download Research Library

A New Era of Data Integration with Tamr and 451 Research

CTOvision

In this video, 451 Research analyst Jason Stamper will look at some of the latest challenges in data preparation and integration, and some of the questions users should ask when trying and tackle them. Michael Johnson.

Applying Our Research To Black Hat 2017

Forrester IT

I summarized RSA 2017 in the following way: It’s a bit like the supermarket, you’ll make far healthier choices if you stick to the outer aisles. Well, Las Vegas B-Sides, Black Hat, and DefCon are taking place this week and since these events differ in tone, audience, and participants, I’ve updated my advice: We’ve gone […]. security & risk security architecture security operations & program governance breakout vendors S&R pros Security & Risk Vendor Landscape Wave

PowerShell security threats greater than ever, researchers warn

Computer Weekly

Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers

McAfee researchers test WannaCry recovery method

Computer Weekly

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

Comprehending Machine Intelligence: Research and Graphic by Shivon Zilis

CTOvision

Bob Gourley. Shivon Zilis is an investor at Bloomberg Beta , a very interesting early stage venture capital fund. I knew I would like Bloomberg Beta when I saw how they do their website. It is smart and reflects very well on their leadership team: They decided to leverage GitHub for their site.

Special for GigaOm Research Members Only: 90 Day Free Access Trial To CTOvision Pro

CTOvision

We also feel for the many companies that leveraged GigaOm research to help fuel their strategic plans and operational decisions. As you evaluate your options we encourage you to consider CTOvision Pro , our subscription only research and analysis service. This service is available at one third the rate of GigaOm research. Special for GigaOm Research Members only: Sign Up For A free 90 Day Trial Today. Analysis Big Data CTO Cyber Security DoD and IC Pro GigaOM Researc

Researcher uncovers UK government threat to privacy

Computer Weekly

Despite concerns about the draft Investigatory Powers Bill, a legal researcher has highlighted that existing legislation is a much bigger threat to privacy than most UK citizens realise

Changing Government Requirement For Market Research to Continuous Market Assessment

CTOvision

This is FAR Part 10 on Market Research. We need we don't need periodic market research. We plan on doing our part to help with Continuous Market Research. Bob Gourley. During interview today with GovMatters.tv I'll be discussing an observation many of us in the enterprise technology community have been discussing lately. There is a growing consensus in the enterprise tech community (CIO, CTO, CISO) regarding the Cambrian Explosion of great capabilities in the tech sector.

Researchers find potentially lethal car hack with no quick fix

Computer Weekly

Security researchers have discovered a supplier-neutral and stealthy smart car hack that can drastically affect the performance and function of the vehicle

7 really cool network and IT research projects

Network World

Researchers at top universities, backed by funding from federal and other outfits, are pumping out loads of research on network security, wireless networking and more.

Three-quarters of enterprises collecting IoT data, says 451 Research

Computer Weekly

A study of IoT buying plans by analysts at 451 Research shows robust growth ahead during 2017

Study 37

New Research Reveals Cybersecurity Skills Shortage Impact

Network World

As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee). So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs? When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little” as I’ve been screaming about this issue for the last 5 years or so.

IoT security threat is real, says researcher

Computer Weekly

The security threat posed by IoT devices is not hype, says security researcher James Lyne

CTOvision Pro: A Subscription Based Research and Analysis Service

CTOvision

CTOvision Pro is our subscription based research and analysis service. CTOvision Pro provides subscribers with more in-depth research, analysis and reporting on topics that matter to enterprise IT.

Forrester’s Security & Risk Research Spotlight - Governance, Risk And Compliance

Forrester IT

Below, I've highlighted some of our most recent and exciting GRC research: Read more Categories: Brand Risk. Crises don't discriminate. Whether they are economic, geopolitical, technological or environmental, you can expect to have to deal with a major one soon. And how well you minimize the impact of that crisis is the difference between achieving your business objectives, and completely missing them, disappointing your customers, employees, partners, and shareholders in the process.

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. By Charles Hall.

IBM Watson Researchers: Carbon Nanotubes Could Power Future Computers

Data Center Knowledge

Researchers claim they found solution to silicon's limitations Read More. Shared

Carnegie Mellon researchers visualize way to fend off DDoS attacks

Network World

Now, a couple of weeks later, Carnegie Mellon's CyLab Security and Privacy Institute too is touting research that it says shows that the tools really needed to stymie such attacks are on the way.

Tools 28

Huge uptick in Zepto ransomware spam, warn researchers

Computer Weekly

Security researchers have raised concerns that attackers are gearing up for a massive Locky-related ransomware campaign

IBM Research Unveils Silicon Photonics Chip Capable of 100Gbps

Data Center Knowledge

Making a big step forward in silicon photonics, IBM Research designed and tested a fully integrated wavelength multiplexed silicon photonics chip, which fully enables the use of pulses of light instead of electrical signals over wires to move data.

IBM 36

Why CX Matters - New Research

IT Toolbox

I recently wrote a series here about collaboration and digital transformation, and it’s really just one of many intersections businesses must manage as the world around them becomes digitized. By now, it should be clear that there’s no going back to analog, and most of the disruption confronting decision makers has to do with transitioning from legacy to what’s in front of

Ventana Research: Big Data Integration Report 2014

CTOvision

By Bob Gourley. Learn how organizations are using big data integration or how they plan to use it as well as an assessment of more general aspects of data integration and technologies that big data requires. Content covers: The importance of data integration for big data analytics.

Paying ransomware attackers perpetuates attacks, says researcher

Computer Weekly

Continually evolving ransomware is among the threats organisations need to factor into their cyber defences in 2017, but only once they have taken care of the basics, says Kaspersky Lab researcher

Cisco security researcher: Ransomware crowd big on customer service

Network World

Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin. They’re in it to make money…Good customer service is important to these people,” he said, and not at all tongue in cheek, during his lunchtime address on the opening day of SecureWorld Boston this week.

Microsoft Invests in Flow Battery Research for Data Centers

Data Center Knowledge

Pilot project to test new battery technology for stability and longevity Read More. Cloud Computing Featured Green Data Centers Microsoft Power

Poor IoT security could take down power grid, warns researcher

Computer Weekly

A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids

HP sponsors cyber security research chair at Birmingham University

Computer Weekly

Five-year research collaboration agreement will support government efforts to address cyber security challenges

Gaming apps ‘main source’ of mobile phishing attacks, research shows

Computer Weekly

Analysis of 100,000 corporate devices shows more than a quarter of traffic going to phishing domains was from gaming apps

Obama Unveils New Federal Supercomputer Research Initiative

Data Center Knowledge

Executive order establishes HPC initiative with a goal go reach exascale computing in the next decade Read More. Government HPC