By Albert Fruz Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organiza...
Posts Tagged: Consultants
By Bob Gourley Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tail...
By Bob Gourley We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprise technology persp...
Hexis Cyber Solutions is fielding one of the most virtuous enterprise cyber security solutions I have evaluated, a capability called HawkEye G. I’ve tracked this capability since it was a concept on a white board and watched as experienced professionals turned those concepts into working model...
By Bob Gourley SecureNinjaTV’s Alicia Webb continues coverage of FEDcyber 2013 by speaking with Bandura Systems CTO David Maestas about their PoliWall appliance that can restrict access to networks by country. This video includes a great discussion and also a live demo of the interface and overvie...
Editor’s note: this is part of our series on FedCyber Summit sponsors. We especially appreciate our sponsors. They show a great appreciation for the federal cyber security mission and we want to bring attention to them here as a way of showing our gratitude. About Microsoft Security: Microso...
Editor’s note: this is part of our series on FedCyber Summit sponsors. We especially appreciate our sponsors. They show a great appreciation for the federal cyber security mission and we want to bring attention to them here as a way of showing our gratitude. About RiskIQ: RiskIQ is a leading...
By RyanKamauff The Cloud & Virtualization Conference will provide a forum for showcasing best practices in securely migrating to next-generation computing platforms and developing cloud infrastructures. The Cybersecurity Conference focuses on the essential defensive security solutions from both ...