Pages

Categories

Search

 

Posts Tagged: CTO

Editor’s Note: This CTOvision.com post was written by  DaveWalker, a highly regarded security professional and inventor in the UK with a focus on design and implementation of multilevel and cross-domain IT security (“MLS”)-bg.   This is something I posted to a Sun internal discussion grou...

We have a lot of news on the mobile front this week; This is unsurprising given that the mobile sector is expanding so fast that some have taken to calling today the “Post-PC Era”.  We all know very well that it’s not over yet, but it’s exciting to see such prolific changes in our day-to-da...

[Editor’s note: This post from Michael Tanji of Kyrus-Tech first appeared at the highly respected national security blog Haft of the Spear. Follow Tanji online at http://twitter.com/mtanji  -bg] Conventional wisdom is telling us that “assumption of breach” is the new normal. Some well...

Cyberspace is an evolving medium, and the best strategic thinking about cyber dimensions of commerce, security, politics, and warfare is likely yet to come. I was happy, however, to read David Betz and Tim Stevens’ recent International Institute of Strategic Studies (IISS) monograph Cyberspace...

Recently, I had the opportunity to participate in The Atlantic Council’s Young Professionals in Cyber Policy discussion with thinkers from industry, academia, think tanks, and policy.  After speaking with Karl Grindal of the Cyber Conflict Studies Association, I realized that part of the reason f...

Botnet takedowns make front page in this week’s security news in review   This week saw a lot of activity on botnet control and disruption as several corporations struggled to disrupt or destroy major botnets and their command-and-control facilities.  Botnets are responsible for some of the ...