Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
Wearers and users of medical devices may not be aware of their risk of having their device hacked. The software used to operate medical devices is vulnerable to malicious attacks. According to one recent report in particular, the attacks might: impede or alter a device’s function, leak...
Editor's note: This post first appeared at MKHamiltonAssociates.com and is republished here with the permission of the author. - bg   Part One: What are the “7012” regulations? Defense Acquisition Regulation Supplement 252.204-7012 In November 2013, the US Department of Defense is...
The O’Reilly Solid Conference The O’Reilly Solid Conference is returning to San Francisco’s waterfront  June 23-25. Solid is unique: a mash-up of MIT and Disneyland for the IoT that combines deep, intelligent conversations about vital issues like security, business models, and standard...
n June 11, 2015, AFCEA Intelligence and the Naval Intelligence Professionals, in collaboration with the Office of the Deputy Chief of Naval Operations for Information Dominance, will present a classified forum examining the state of Information Dominance in the U.S. Navy.  If you have ...
Another event we would like to bring to your attention is the AFCEA coordinated DoD CIO Mobility Industry day of 9 July 2015. Mobility is not just a major trend for DoD, but is a major driver of future mission functionality and is also posing very unique security challenges for the dep...
We recently had the opportunity to interview the Director for Intelligence (J2) for the Joint Chiefs of Staff, RADM Paul Becker, USN. RADM Becker has served in this position since September 2013. The Joint Staff J2 is a position requiring a constant awareness of the day-to-day threats ...
Today, Bright Computing signed a partnership agreement with NTS Africa. Bright Computing is the leader in high performance infrastructure management solutions for cloud, big data and high-performance computing. NTS Africa is a company that provides clients with advanced technology and ...
On July 29, 2015, AFCEA Intelligence and the Office of the Deputy Chief of Staff for Intelligence, Headquarters, U.S. Army, will co-sponsor a special, one day classified event tailored for members of industry focused on U.S. Army Intelligence.  The event will be held at Engility Herita...
On 30 April 2015 industry leaders and government practitioners gathered in Tysons Corner to discuss technology trends, innovation, and ways to enhance enterprise and mission outcomes. Technology and Emerging Concepts for Enhanced Cybersecurity, the forum’s first panel discussion, consi...
The Light Phone might not be a high functioning smartphone with a high-def touch screen, but it does make and receive phone calls. That might not sound very interesting, but what is cool about this phone is that it can be like your virtual receptionist. Through an app on your smartphon...
There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives are collaborat...
Register now for our 21 May webinar with SAS focusing on architecture and design patterns for optimizing SAS and Hadoop. SAS Business Analytics software is focused on delivering actionable value from enterprise data holdings. The long-term, consistent vision and continuous innovation o...
ISACA, a global professional association serving 140,000 professionals, has published a new guide about the current cybersecurity threat for industrial control systems (ICS). Titled “Industrial Control Systems: A Primer for the Rest of Us” the guide takes a deeper look at ICS and why s...
At 11am EDT Carahsoft is hosting a webinar featuring Datameer and Cloudera diving into ways to find waste, fraud and abuse through big data analytics. From the webinar page: Finding Fraud, Waste, and Abuse through Big Data Analytics with Cloudera and Datameer Cloudera and Datameer invi...
With this post we are initiating coverage of Bright Computing. Bright Computing provides comprehensive software solutions for provisioning and managing HPC clusters, Hadoop clusters, and OpenStack private clouds in your data center or in the cloud. Bright's platform, the Bright Cluster...
SAS and Hadoop work together in ways supportive to enterprise missions. Analysts are able to leverage comprehensive enterprise data stores by use of familiar interfaces and methods and with the well engineered SAS and Hadoop architecture can dramatically improve their results for missi...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Firemon has been a leader in security management technology for over a decade. Their security manager 8.0 monitors and validates compliance throughout your network, cleans...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Haystax is a new kind of analytics and cybersecurity company. They are mature enough to have proven technologies, but new enough to create cutting edge products and delive...
Many of us have had this problem:  we've run out of storage on our iPhone or iPad, and don't want to upgrade to a model with higher capacity, or, worst, there is no model with enough capacity to satisfy our need.  Fortunately, there are many solutions to this problem. You're probably a...
In the video below and at this link, Datameer's CEO Stefan Groschupf  highlights the evolving nature of the Big Data landscape, drawing historical parallels and lessons worth thinking through. A key point: there are risks we must mitigate as the Hadoop ecosystem evolves.     ...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. We are excited to introduce Mesosphere to the DC technology ecosystem. The Mesosphere datacenter operating system helps you organize the machines in your datacenter as if ...
Hortonworks, a partner with Informatica, will be joining Informatica World next week in Los Vegas. Hortonworks will be discussing how to optimize the entire big data supply chain on Hadoop and how to turn data into actionable information to drive business value. The sessions to watch f...
As we have noted in the past, “The nice thing about standards is that you have so many to choose from” teaches Andrew S. Tanebaum in his classic text on Computer Networks. This adage is especially true when it comes to cybersecurity. We encounter so many standards in the corporate worl...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Endgame just launched its first enterprise product, Endgame Enterprise, at RSA last week.Endgame Enterprise is the industry’s first endpoint detection and response (EDR) p...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Founded in 2010, ICG specializes in real-time streaming and analytics through its LUX solution. LUX helps organizations rapidly mine and correlate massive amounts of data ...
With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure. For a short intro...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Digital Reasoning is the maker of the mission-focused analytics software platform, Synthesys®, a solution used in government agencies to uncover security threats and enabl...
Great champions of federal IT FedScoop and Brocade have combined efforts to produce an informative event that can help ensure your networks and data centers are optimized. And by optimized I mean are significantly reducing your IT spend, which should get your attention. Here is more fr...
While the ability to access and analyze Big Data gives your company a competitive advantage, it also introduces significant new risks and challenges. Relevant issues include tracing data sources and lineage; auditing changes made to data and data management policy; and ensuring users s...
SAS and Hadoop work together in ways supportive to enterprise missions. Analysts are able to leverage comprehensive enterprise data stores by use of familiar interfaces and methods and with the well engineered SAS and Hadoop architecture can dramatically improve their results for missi...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Red Owl Analytics is a highly regarded provider of a software solution that enables security and compliance teams to proactively tackle their most pressing problem-- insid...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Basis Technology provides software solutions for extracting meaningful intelligence from unstructured text. They help organizations improve the accuracy of search, text mi...
HIPAA was enacted in 1996, and by April 2005 security standards were required to be in place for most covered entities. In 2013 key portions of this law were updated. This post provides an overview of key elements we believe security and technology professionals (and most citizens) sho...
Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centr...
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure and highly functional cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associati...
There really is nothing like getting 350 great, mission-focused brains in a room to work collaboratively on big ideas, and that is exactly what we are doing at the 30 April Synergy Forum. Some things just can't be done from a afar. With that as a disclaimer, there are things you can do...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. Cisco is one of the most widely recognizable brands in the technology landscape. They are known for enterprise scale delivery of solutions that really work. They are also ...
The Solid Conference dives deep into Hardware, Software and the Internet of Things, June 23-25 in San Francisco, CA. You have been tracking the trends and realize the traditional boundaries between hardware and software are falling. Whatever you choose to call this disruption—the Inter...
We recently had the opportunity to interview the CIA CIO, Doug Wolfe. Doug has been the CIA’s CIO since 2013. In this role he oversees the agency information technology vision and strategic direction. He is also an advisor to the intelligence community CIO and a collaborative leader in...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. We are very pleased to help bring WayIn into the DC tech ecosystem by introducing them at our Synergy Forum. This social intelligence company integrates content into new e...