Security Innovation Network SINET 16 Application Process Now Open

SINET_logo_for_twitter

We have previously written about the Security Innovation Network (SINET) and the yearly SINET Showcase.  This is a group every technology firm should have some familiarity with now. Startups should track SINET as a way to learn and perhaps expose your technology to the community. Established security firms should track SINET to learn of emerging […]

Tapping Global Threat Intelligence To Secure Enterprise Networks

cyber-human-face-blue

Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to register see: http://ctolink.us/1nKbQqy On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information […]

More Questions than Answers from Data Breach Report

internet-of-things-2

The American media has never paid more attention to data breaches and cybersecurity than it does today. Major breaches in the last year – at large companies like Target and eBay – have made information security discussions more worrying and more widespread, albeit still not universally understood. On August 5th, Nicole Perlroth and David Gelles […]

Video Shows What To Do When Your Cyber Adversaries Are Automating

security

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response. The bottom line of this research: […]

Interview on Automated Malware Removal

cybersecuritylock

Editor’s note: This interview was first posted on the Hexis Cyber website. – bg Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision Another day, another data breach. While there’s still an emphasis – and related spending – on malware detection, most incident response teams are actually overwhelmed by vast number […]

Our Views On Automating Cyber Defense Including Malware Removal and Return to a Known Good State

number-of-companies-580x434

Threat actors are increasingly automating their attacks, making defense harder and overwhelming incident response teams. Defenders have long looked to automated discovery as a means to mitigate this threat, but until recently, mass automation and response/threat removal hasn’t been a viable option. With changes in technology, enterprise cyber security professionals can now leverage automated in-line […]