Quantcast
Channel: CTOvision.com
Browsing all 54 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The HawkEye-G Approach: Detect, Engage, Remove at Machine Speed

By Bob Gourley We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on the approach taken in the Hexis HawkEye-G solution. The simple way...

View Article


New Video: Automating Your Cyber Defenses Including Malware Removal

By Bob Gourley The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your...

View Article


Interview on Automated Malware Removal

By Bob Gourley Editor’s note: This interview was first posted on the Hexis Cyber website. – bg Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision Another day,...

View Article

Video Shows What To Do When Your Cyber Adversaries Are Automating

By Bob Gourley The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your...

View Article

Image may be NSFW.
Clik here to view.

Tapping Global Threat Intelligence To Secure Enterprise Networks

By Bob Gourley Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to...

View Article


UPS Data Breach

Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions...

View Article

Cyber Threat Intelligence Feeds: The Top 20 Sources Of Actionable Cyber...

The discipline of cyber threat intelligence focuses on providing actionable information on adversaries. This information is becoming increasingly important to enterprise cyber defense. This importance...

View Article

Image may be NSFW.
Clik here to view.

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris...

By Bob Gourley Announces Acquisition of Sandboxie to Expand Global Reach, Small Business Footprint and Consolidate the Two Leading Brands in Burgeoning Virtualized Containment Solutions Market FAIRFAX,...

View Article


Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat...

By Bob Gourley In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium...

View Article


Image may be NSFW.
Clik here to view.

Lessons Learned: Are you one of the Fortune 500’s Unfortunate 221?

By Bob Gourley The Recorded Future Special Intelligence Desk has just released a new Threat Intelligence Report we found to be full of important context and actionable information for enterprise cyber...

View Article

Dell Data Protection Protected Workspace & Malware Prevention

By Katie Kennedy The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The three key points covered in the video are: Attackers,...

View Article

Image may be NSFW.
Clik here to view.

2015 Data Breach Investigations Report (DBIR): Strategic intelligence for...

The yearly Data Breach Investigations Report (DBIR), conducted by Verizon with contributions by over 70 organizations from around the world, has become an important yearly marker on the state of...

View Article

Kicking the Tires: Verisign DNS Firewall

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an...

View Article


Image may be NSFW.
Clik here to view.

Fed Tech Roundup December 2

The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Zuckerberg Vows to Daughter He'll Donate 99% of His Facebook...

View Article

Ransomware Evolves: Entire Hospital Including Emergency Rooms Disrupted

Bob Gourley Cybersecurity and business risk professionals have watched ransomware evolve from a minor nuisance to a major threat capable of holding multiple systems at risk. Evidence of the rapidly...

View Article


Are you ready for a state-sponsored cyber attack?

Geopolitical tensions ensure that 2017 will be another big year for state-sponsored cyber attacks.  The lethality of state-sponsored attacks derives from their ability to bypass security point products...

View Article

Are you ready for state-sponsored zombie malware attacks?

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored...

View Article


Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat...

In what could be a very virtuous trend, four of the cyber security industry's leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the...

View Article

Security Theater: USB Everythings

 USB is a wonderful technology -- it allows us to be platform-agnostic, gives us compatibility, ease of use, and more durability than some previous connectors we have used in the past. It also presents...

View Article

Mobile Risk Management: Welcome to the Jungle

Philip Ewing reports on a nightmare scenario for the Department of Defense. Suppose a worker’s Android phone is infected with malware, and she innocently plugs it into her work computer to charge and...

View Article
Browsing all 54 articles
Browse latest View live