Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
By John Scott Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves headcount from one part of the enterprise to the expe...
By Bob Gourley The video at this link and embedded below captures the content and dialog of a webinar which examined new capabilities of Cloudera and Intel, with a focus on capabilities that provide a full stack solution to many key enterprise mission needs. The webinar included insigh...
By Dan Cybulski It is no secret that today’s data intensive analytics are stressing traditional storage systems. The capacity of individual drives continues to increase while performance sees little change. As such, organizations are leveraging horizontal scale and non-volatile memory ...
By Bob Gourley Recorded Future has launched a new free service for cyber defenders which I am finding valuable for situational awareness. This new cyber daily provides technical indicators and context around vulnerabilities making them more understandable and helping put them in contex...
By Bob Gourley One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. Respon...
By Bob Gourley If you track cyber security you have no doubt heard of the recently published report by Cylance titled Operation Cleaver. It has been extensively referenced in the press (including here and here) and has generated significant dialog among practitioners, pundits and polic...
Since the birth of Hadoop in 2005-06, the way we think about storing and processing information has evolved considerably. The term “Big Data” has become synonymous with this evolution. But still, many of our customers continue to ask, “What is Big Data?”, “What are its use cases?”, and...
We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. Of the many virtuous activities of this group, my favorite event is the yearly Showcase held ...
The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The three key points covered in the video are: Attackers, even the low skilled ones, can pass any traditional AV scanners at will – trivial for those infi...
This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter. Every year the Ponemon Institute brings critical insights to the corporate governance world by conducting a focused study on the cost of cyber crime. As you probably intuitively know, the costs of cyber crime c...
The video at this link and embedded below provides a short overview of FedCyber 2014. Our yearly event is a non-attribution session, and we are careful to respect that in this clip, but we do provide some context you may find relevant from the event. If you are a member of the federal ...
“Sometimes quantity has a quality all its own” attributed to Stalin & Clausewitz Operational scale doesn’t get much love or discussion from folks since its boring to talk about: truly large scale things have been simplified and optimized to do a few very specific things extremely w...
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabil...
CTOlabs.com, the research arm of CTOvision.com, produced a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. We will...
Here is the latest technology news from across the tech community: Sector Update: Technology Shares Mixed in Pre-Market Trade In technology stocks news, Gogo ( GOGO ) reported a Q3 loss of $ 0.29 per share, vs. a year ago loss of $ 0.22 per share and wider than expectations of a loss o...
Here is the latest technology news from across the tech community: Ten million jobs at risk from advancing technology Angus Knowles-Cutler, London senior partner at Deloitte, said: “Technological advances are likely to cause a major shift in the UK labour market in the coming decades. ...
This workshop is for real developers only. It will sell out soon. Please check it out now and if you need to be there register immediately. If you know someone else who should be there tell them to do the same. From: http://ctolink.us/1xdZZZ9 Big Data Integration Workshop Tue, Dec 2 — ...
The United States and Japan just released their Interim Report on the Revision of the Guidelines for U.S. – Japan Defense Cooperation. (Available here: http://www.defense.gov/pubs/20141003_INTERIM_REPORT.pdf) Anyone who works U.S.-Japan interoperability issues (from policy to technolog...
The blurring lines between physical and cyber systems, accusations of data monitoring from Snowden revelations, and the the deluge of cyber attacks in 2014 have resulted in new levels of American interest in cybersecurity and digitalization. A few examples of this attention are the spe...
With the movement of our personal and business critical data to the ‘cloud’, and directed attacks on that data, many of us make use of stronger security through use two-factor authentication. I know everyone reading this has two-factor turned on for iCloud, Google Services, and DropBox...
The blurring lines between physical and cyber systems, coverage of data monitoring from the Edward Snowden revelations, and the deluge of cyber attacks in 2014 have resulted in new levels of American interest in cybersecurity. A few examples of this attention are the speculations aroun...
The newly revised formats and enhanced reporting of our daily ThreatBrief have caused readership to take off. We really appreciate and are amazed at the response. There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This i...
The following are some of the tech news stories we are tracking:   HP Extends Benefits of ARM Architecture Into the Datacenter With New Servers PALO ALTO, CA — (Marketwired) — Sep 29, 2014 — HP ( NYSE : HPQ) today announced two ARM®-based servers, including the first ...
There is a famous TED video by author Matt Ridley called “When Ideas Have Sex.” Paraphrased, the line that I love goes, “When ideas are having sex, innovation happens.” While these three fast-paced technologies (social, cloud and mobile) are themselves children ...
I love and respect NIST and I just want to come right out with that so you know where I am coming from. Now add on top of that the fact that they have just issued a draft document that discusses items at the intersection of three of my passions, Cyber Security, Technology and Intellige...
The Recorded Future Special Intelligence Desk has just released a new Threat Intelligence Report we found to be full of important context and actionable information for enterprise cyber defenders. The report, titled The Fortune 500’s Unfortunate 221, is available for download her...
Benjamin Franklin once said, “If you fail to plan, you plan to fail.” This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Though you may have the best IT department in the world and advanced computing resources, if there ...
On September 30th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. One of the many topics coved at the event was software defined perimeter and cloud security alliance. Coca-Cola was used as a case study. Alan Boehme, the acting CISO at Coca-Cola. Ed Steinike, the CIO at C...
CTOs should consider having their development teams take advantage of free, entry-level versions of software – known as freemium software – to test out the functions of commercial products. From the perspective of Michael Williams, BIRT Product Evangelist & Forums Manager at report...
These are some of the hot technology stories we are following… The Mysterious Company That Has Tech Giants Dropping 2 Million Magic Leap, a Hollywood, Florida, based start-up announced today it received a $ 542 million round of funding led by Google, along with Qualcomm Ventures,...
This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter. Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence...
Ayasdi provides advanced analytics software to healthcare, financial services, life sciences, energy, public sector, consumer products, high-tech, and for communications. The vision of Ayasdi: Deep Analytics Will Be Essential and Transformative For Every Organization. Our Goal is to Ma...
Police use technology to track movements of suspect in Indiana killings as … Police use technology to track movements of suspect in Indiana killings as probe widens. Published October 23, 2014. Associated Press. Facebook0 Twitter0 Email Print. 18782a05aeb84929630f6a7067004b49.jpg...
Today’s data centers are being built at the forefront of industry standards. Within the past five years, the way we construct data centers has changed dramatically. David Cappuccio, the Chief of Infrastructure Research at Gartner, told CIO that “Data centers will no longer be constrain...
What if you decided to take a holiday in the sun on a luxurious cruise liner only to discover that your shipmate could have Ebola? Determining who may have come in contact with the potential victim is tricky. LUX, an analytics tool, has the ability to track individuals and ships to aid...
Here is some of the technology news we are tracking from across the tech community: Gartner’s Top 10 Strategic Technology Trends for 2015 Gartner, Inc. (NYSE: IT) is the world’s leading information technology research and advisory company. We deliver the technology-related ...
For those of us who work in and around the enterprise security domain something unique has just happened. The U.S. Government has just approved a commercial consumer device, the Samsung Galaxy family of devices, for classified info. This means government organizations can establish new...
Last week I was lucky enough to tour the new F-35B Training site at Marine Corps Aviation Squadron, Beaufort, South Carolina. I have been reading about the pros and cons of this new airframe for years, and with a price tag that continues to surpass all expectations, I was eager to see ...
There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives are collaborat...