By Marcus Williams Cyber News we are tracking today: Having multiple hypervisors is a growing trend in the virtualization . Customers have mixed emotions about VMware recent purchase of the Virsto software product. Red Cross decided to use Microsoft Office 365. and more. Are Multihyp...
Monthly Archives: February 2013
By Bob Gourley There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those ...
By Bob Gourley In this series of posts we are providing views on three key community-focused, virtuous collaborative venue that help the DC tech community exchange lessons learned and accomplish big goals. With this series we hope to provide insights you can use to make the most out of MeriTalk, G...
“German news magazine The Spiegel reported on Sunday that European Aeronautic Defence and Space Company (EADS) and German Industrial multinational conglomerate ThyssenKrupp, have fallen victim to recent cyber-exploitation attacks. A few months ago, an ‘extraordinary attack’ was launc...
“Beijing hotly denies accusations of official involvement in massive cyberattacks against foreign targets, insinuating such activity is the work of rogues. But at least one element cited by Internet experts points to professional cyberspies: China’s hackers take the weekend off. Accusati...
“The Aspen Institute is the latest U.S. organization to see some of its e-mail accounts targeted in the purported wave of Chinese cyberattacks. Three of the institute’s estimated 350 e-mail accounts were broken into, said Trent Nichols, director of information technology and services for...
By Bob Gourley With this post I would like to tell you about an event I am participating in with the CEO of Thetus Danielle Forsyth. Danielle is an engineer by training and has led a cadre of incredibly talented computer scientists, designers, engineers and data scientists in the creation of a platf...
By Bob Gourley The Mobile Device Management (MDM) Security Requirements Guide (SRG) is one in a family of SRGs addressing mobility solutions. Other mobility SRGs include the Mobile Operating System SRG, Mobile Applications SRG, and the Mobile Policy SRG. DISA and DoD guidance is that any organ...