CTOvision seeks to provide information that helps enterprise technologists succeed. This includes curated lists of technologies we believe hold the greatest potential of making dramatically positive/virtuous contributions to organizational missions. Since all of us already know the big players in t...
Posts Tagged: Computer crime
By Charles Hall If you’re interested in cyber security and operations at the federal level, check out the AFCEA Defensive Cyber Operations Symposium. This event combines the JIE Mission Partners Symposium and the International Cyber Symposium to increase dialogue among key participants, br...
By Katie Kennedy Cybercrime is now a trillion dollar industry. Cyber criminals are becoming more sophisticated; therefore, a new solution is needed. The newest white paper added to the CTOvision Research Library highlights cybercrime and how to detect and prevent cyber attacks with the Enterprise S...
By Ryan Kamauff Here are the top cyber news and stories of the day. Cyber Security Depends on Education – One of the issues that is always brought up with Cyber in organizations is how to train and educate your personnel to behave responsibly in the cyber domain. This blog at Harvard Business ...
By Bob Gourley I’m on the board of Centripetal Networks, a firm with dramatically virtuous technology that I believe will change the world. With this post I’ll tell you more about this firm, with a focus on the differentiators of their capability. The core capability of Centripetal Netwo...
After two years of intensive study and research, the Cyber Conflict Studies Association is preparing to release their book-length monograph on “Addressing Cyber Instability.” Last month, the CCSA released an executive summary previewing the work, which is available for download. The im...
[Editor’s note: This post from Michael Tanji of Kyrus-Tech first appeared at the highly respected national security blog Haft of the Spear. Follow Tanji online at http://twitter.com/mtanji -bg] Conventional wisdom is telling us that “assumption of breach” is the new normal. Some well...
Recently, I had the opportunity to participate in The Atlantic Council’s Young Professionals in Cyber Policy discussion with thinkers from industry, academia, think tanks, and policy. After speaking with Karl Grindal of the Cyber Conflict Studies Association, I realized that part of the reason f...