21-22 May O’Reilly Solid Conference Heralds the Merging of the Physical and Virtual Worlds

SolidConf_Tagline_small (1)

We previously wrote about the 21-22 May O’Reilly Solid Conference in San Francisco and just heard from the organizers that a significant number of registrations came from that write-up. That makes this event even more exciting for me, it means our readers are into this topic in measurable ways. It also confirms our assessment that enterprise […]

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

securitypadlock-360x200

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tailor this reporting in a twice weekly CISO Technology Report. This […]

You Should Run R On Your Computer: Not just for stats, but to know what all the excitement is about

R-on-my-mac

“R” is a freely available language for interacting with your computer that is designed for a wide variety of functions. It is most frequently associated with statistical computing and graphics. R runs on a wide variety of systems, including Mac, Windows, Linux and Unix. Every analyst who deals with data should have a copy of […]

Obama Administration Chose Cooperation over Counterattacks

cyber-time-magazine

Throughout 2012, Iran targeted United States banks and companies with a series of distributed denial-of-services cyber attacks. The attacks doubled and sometimes tripled the amount of traffic that the American websites were capable of handling. Many considered the attacks retaliation, revenge for the destruction wrought by Stuxnet on Iran’s nuclear program. The cyber attacks presented […]

HawkEye-G: Addressing key enterprise security technology needs

cybersecuritylock

We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprise technology perspective: Over the years, CIOs, CTOs, CISOs and world class best cyber defense professionals have collaborated on the […]

USMC and DoD Rapid Reaction Technology Office Seeks Info On Six Categories of Technology: Please review and engage

Usmc

Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. The threat of improvised explosive devices (IED) has proven very difficult to mitigate. This strategic threat poses […]