On 26 August 2015 the DoD promulgated new rules that apply to any contractor or subcontractor that does business with the DoD. These rules are in immediate effect. We are compiling information we will use in future reporting on CTOvision.com and also to provide as feedback to DoD on the new rules. W...
Posts Tagged: Cyber Threat
Wearers and users of medical devices may not be aware of their risk of having their device hacked. The software used to operate medical devices is vulnerable to malicious attacks. According to one recent report in particular, the attacks might: impede or alter a device’s function, leak sensitive d...
Thanks to Amazon.com we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special two day promotion running 23 and 24 April. The book was written to provide actionable insights into the cyber threat specially aimed towards the leader who ...
By Charles Hall Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats...
By Bob Gourley In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the furtherance of the art and science of cyber threat intelligence. This alliance, started...
By Bob Gourley Editor’s note: In-memory computing has been a fast growing trend in enterprise IT. It is a great way to modernize old apps and build incredible new systems that can quickly accomplish what has been impossible to date. But In-memory computing comes with new kinds of security challeng...
By Ryan Kamauff Here are the top cyber news and stories of the day. Hackers go phishing with Obamacare – It is possible that using the new HealthCare.gov site will open up users to more vulnerabilities and more. Because users are likely to be confused by the new system, they are more vulnerable to...
By Ryan Kamauff Here are the top cyber news and stories of the day. LinkedIn Shuts Down Four XSS Flaws – “LinkedIn has closed the door on four cross-site scripting (XSS) vulnerabilities, which could have been used to ultimately steal credentials from users.” LinkedIn is one of the top professi...