Research Announcement: Cybersecurity Incident Response Services Wave

Forrester IT

I’m getting ready to kick off a Forrester Wave on Cybersecurity Incident Response Services that should be viewed as a refresh of the Digital Forensics and Incident Response Service Providers Wave published in September of 2017.

Researchers warn of new support scam malware

Computer Weekly

Security researchers have identified a new strain of support scam malware and a way of clearing up infected machines

Could Classifying AI Research Prevent Public Harm?

CTOvision

But some individuals are concerned about what could happen if information about AI research falls into the wrong hands. Headlines frequently feature news about advancements in artificial intelligence (AI). These developments collectively boost public interest in AI and help people imagine what’s possible. Hackers Are Typically One Step Ahead The increase in cybersecurity attacks has […]. Artificial Intelligence News

Researchers Say Google Fiber Has Nationwide Potential

CTOvision

Bernstein Research, an equ. CTO Cyber Security DoD and IC Government Research Tech Trends Comcast Federal Communications Commission Google Google Fiber Internet service provider Net neutrality Sanford Bernstein Wall Street

Research Announcement: The Forrester Wave™: Managed Security Service Providers In Asia Pacific, Q1 2019

Forrester IT

Research Announcement: My first Forrester Wave™: Managed Security Service Providers In Asia Pacific, Q1 2019. Gather round!!

IoT security threat is real, says researcher

Computer Weekly

The security threat posed by IoT devices is not hype, says security researcher James Lyne

GDPR could ramp up cyber extortion demands, warns researcher

Computer Weekly

The ransom demanded for stolen or encrypted data is likely to rise after the General Data Protection Regulation compliance deadline in May 2018, according to a cyber security researcher

Encryption keys too predictable, warn security researchers

Computer Weekly

Encryption keys are not as random as most people think, which means encrypting data is often not as secure as it could be, according to security researchers

Testing is key to IoT security, says researcher

Computer Weekly

Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field

HP sponsors cyber security research chair at Birmingham University

Computer Weekly

Five-year research collaboration agreement will support government efforts to address cyber security challenges

HP 197

Virginia Announces Research Commercialization Awards

CTOvision

The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8

HPE Superdome Flex in-memory supports Big Bang research

Computer Weekly

Stephen Hawkin’s Cosmos research group takes delivery of a Superdome HPC to enable it to test theoretical models of the Big Bang

PowerShell security threats greater than ever, researchers warn

Computer Weekly

Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers

Convergence: The Catalyst to Transform Scientific Research

Cloud Musings

by Melvin Greer Greer Institute for Leadership and Innovation A new transformative research approach is gaining global attention and adoption. This is an appropriate way to characterize and address converging research in life sciences and engineering, computation, and physical sciences.

Paying ransomware attackers perpetuates attacks, says researcher

Computer Weekly

Continually evolving ransomware is among the threats organisations need to factor into their cyber defences in 2017, but only once they have taken care of the basics, says Kaspersky Lab researcher

McKinsey AI research finds slender user adoption outside tech

Computer Weekly

McKinsey Global Institute research finds artificial intelligence adoption to be exiguous and experimental outside the technology sector, but registers rapidly growing investment

Announcing CTOvision Pro: Our Subscription Based Research and Analysis Service

CTOvision

This step will help us focus providing the most relevant content to our readers and we believe will help readers conducting market research find the information they need faster. CTOlabs.com has a paid subscriber base for access to in depth research and analysis. This high quality content includes access to online research and reports as well as a bi-weekly newsletter of up to date context and analysis that can help you apply emerging technologies to your mission needs.

Accelerating Cancer Research Using a Big Data Approach

CTOvision

New to the CTOvision research library , Cray's Solution Brief "Accelerating Cancer Research Using a Big Data Approach." In this brief, Cray address the challenge for cancer researchers and offers a solution. A hypothesis from cancer researchers is that big data could be used to identify new drug treatments from data already available through the analysis of gene-drug relationships. Big Data CTO Health IT Cancer Research Cray Download Research Library

Researcher finds over 711 million compromised email accounts

Computer Weekly

A security researcher has discovered a spambot using more than 711 million compromised email accounts to spread data-stealing malware

Researcher uncovers UK government threat to privacy

Computer Weekly

Despite concerns about the draft Investigatory Powers Bill, a legal researcher has highlighted that existing legislation is a much bigger threat to privacy than most UK citizens realise

Poor IoT security could take down power grid, warns researcher

Computer Weekly

A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids

Researchers find potentially lethal car hack with no quick fix

Computer Weekly

Security researchers have discovered a supplier-neutral and stealthy smart car hack that can drastically affect the performance and function of the vehicle

Access To CTOvision Pro Research Service

CTOvision

CTOvision Pro provides business and technology leaders with access to extended, actionable research and analysis. Logins to our market research, technology assessments and special reports. Access to additional reporting and our full research library. By Bob Gourley.

Three-quarters of enterprises collecting IoT data, says 451 Research

Computer Weekly

A study of IoT buying plans by analysts at 451 Research shows robust growth ahead during 2017

Focus needs to shift to breach impact, says McAfee researcher

Computer Weekly

Breach investigations commonly focus on the attackers and their motives, but a security researcher believes there needs to be more emphasis on business impact

Skygofree Android spyware active since 2014, say researchers

Computer Weekly

Powerful, highly advanced spyware has been targeting Android mobiles for the past four years, security researchers have discovered

Radiation detection devices open to cyber attack, researcher finds

Computer Weekly

A security researcher has discovered numerous security flaws in multiple devices that are used to detect radiation in critical facilities

Work needed to ensure positive tech revolutions, says researcher

Computer Weekly

The first technology revolution was brought about by all computers going online, but care must be taken that in the second and third tech revolutions, the good outweighs the bad, a cyber security researcher warns

Birmingham Uni beefs up network automation, virtualisation to support research

Computer Weekly

The University of Birmingham has deployed a Brocade switching infrastructure and network virtualisation to support the needs of its research teams

Industrial control systems under attack, warns MIT researcher

Computer Weekly

Industrial control systems are under attack, and these attacks are likely to get worse, according to a security researcher and former NSA inspector general

Andromeda mastermind Sergey Jarets jailed, say security researchers

Computer Weekly

Security researchers say they believe that a hacker arrested by Belarus police is Andromeda botnet mastermind Sergey Jarets

Cambridge University sets up £25m network research group

Computer Weekly

Academic networking and communications research project will run for five years with financial support from BT and Huawei

Groups 121

The Research You Need To Overcome Seams In Experiences

Forrester IT

Seamlessness is quite the buzzword these days. It seems that brands of all shapes and sizes are vying to achieve it — from cars, to shopping, to payments, to even “co-living” communities, the storied “seamless” experience seems to be everywhere. But are the experiences that we think are seamless in fact delivering superior experiences? Many firms […]. age of the customer

CTOvision Pro: A Subscription Based Research and Analysis Service

CTOvision

CTOvision Pro is our subscription based research and analysis service. CTOvision Pro provides subscribers with more in-depth research, analysis and reporting on topics that matter to enterprise IT.

UK must use new technologies in the workplace to reverse productivity issues, say researchers

Computer Weekly

Researchers have called for the UK to utilise new technologies in the workplace to drive better productivity