The HawkEye-G Approach: Detect, Engage, Remove at Machine Speed
By Bob Gourley We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on the approach taken in the Hexis HawkEye-G solution. The simple way...
View ArticleNew Video: Automating Your Cyber Defenses Including Malware Removal
By Bob Gourley The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your...
View ArticleInterview on Automated Malware Removal
By Bob Gourley Editor’s note: This interview was first posted on the Hexis Cyber website. – bg Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision Another day,...
View ArticleVideo Shows What To Do When Your Cyber Adversaries Are Automating
By Bob Gourley The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your...
View ArticleTapping Global Threat Intelligence To Secure Enterprise Networks
By Bob Gourley Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to...
View ArticleUPS Data Breach
Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions...
View ArticleCyber Threat Intelligence Feeds: The Top 20 Sources Of Actionable Cyber...
The discipline of cyber threat intelligence focuses on providing actionable information on adversaries. This information is becoming increasingly important to enterprise cyber defense. This importance...
View ArticleSecurity News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris...
By Bob Gourley Announces Acquisition of Sandboxie to Expand Global Reach, Small Business Footprint and Consolidate the Two Leading Brands in Burgeoning Virtualized Containment Solutions Market FAIRFAX,...
View ArticleFortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat...
By Bob Gourley In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium...
View ArticleLessons Learned: Are you one of the Fortune 500’s Unfortunate 221?
By Bob Gourley The Recorded Future Special Intelligence Desk has just released a new Threat Intelligence Report we found to be full of important context and actionable information for enterprise cyber...
View ArticleDell Data Protection Protected Workspace & Malware Prevention
By Katie Kennedy The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The three key points covered in the video are: Attackers,...
View Article2015 Data Breach Investigations Report (DBIR): Strategic intelligence for...
The yearly Data Breach Investigations Report (DBIR), conducted by Verizon with contributions by over 70 organizations from around the world, has become an important yearly marker on the state of...
View ArticleKicking the Tires: Verisign DNS Firewall
Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an...
View ArticleFed Tech Roundup December 2
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com): Fed Tech Ticker Zuckerberg Vows to Daughter He'll Donate 99% of His Facebook...
View ArticleRansomware Evolves: Entire Hospital Including Emergency Rooms Disrupted
Bob Gourley Cybersecurity and business risk professionals have watched ransomware evolve from a minor nuisance to a major threat capable of holding multiple systems at risk. Evidence of the rapidly...
View ArticleAre you ready for a state-sponsored cyber attack?
Geopolitical tensions ensure that 2017 will be another big year for state-sponsored cyber attacks. The lethality of state-sponsored attacks derives from their ability to bypass security point products...
View ArticleAre you ready for state-sponsored zombie malware attacks?
On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored...
View ArticleFortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat...
In what could be a very virtuous trend, four of the cyber security industry's leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the...
View ArticleSecurity Theater: USB Everythings
USB is a wonderful technology -- it allows us to be platform-agnostic, gives us compatibility, ease of use, and more durability than some previous connectors we have used in the past. It also presents...
View ArticleMobile Risk Management: Welcome to the Jungle
Philip Ewing reports on a nightmare scenario for the Department of Defense. Suppose a worker’s Android phone is infected with malware, and she innocently plugs it into her work computer to charge and...
View Article