Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
Bob Gourley Verisign and Cognitio are hosting an action-oriented Cyber Strategy Seminar focused on establishing a framework for resilient cybersecurity in the public sector on Tuesday, May 3, 2016. The seminar will include a facilitated dialog in which we will explore the need to expan...
Bob Gourley Mark Zuckerberg walked through Facebook's 10 year plan during the keynote of the F8 conference on 12 April 2016. This roadmap is grounded in reality but very exciting. And it starts with a great articulation of Facebook's mission.  Facebook is focused clearly on connecting ...
Bob Gourley There have been rumors in the security community for several weeks now about outages in the Swedish Air Traffic Control System that may have been caused by malicious activity.  Now reporting indicates these rumors may in fact be true. There have not been any official g...
Bob Gourley An operational fleet of robotic trucks just demonstrated their safety and efficiency by autonomously moving across Europe. In an article titled "A fleet of trucks just drove themselves across Europe," Joon Ian Wong writes that: About a dozen trucks from major manufacturers ...
Bob Gourley One of the greatest mistakes executives make in the modern age is assuming that the cyber threat is static. Your greatest adversaries are dynamic, well resourced organizations led by thinking, creative people. They will change. There are steps you can take to track cyber th...
Bob Gourley DoD technologists continue their pioneering work in leveraging cloud computing in support of national security missions. Cloud Computing for DoD is hard for many reasons, including the fact that like many other organizations the tendency is to keep things in motion that are...
Bob Gourley Cognitio's Roger Hockenberry is providing insights and lessons learned on the cyber threat during the 12 April 2016 Federal Security Summit in Washington DC. Event Details Date:         April 12, 2016 Location:  Spy Museum, 800 F Street NW, Washington, DC 20004 Time:       ...
Thanks to the professional, virtuous work of security researchers Chris Valasek and Charlie Miller and some fantastic reporting on this research by Andy Greenberg of Wired Magazine, we have long known that theoretical hacks against cars are no longer theoretical. They are real. Many co...
Bob Gourley Statistically most of our daily readers consume our content via newsletter. If that is you, thank you! If not, you can subscribe to any of our tailored newsfeeds at this link. We would also like to encourage you to sign up to our Twitter Feed.  We populate our feed with lin...
Bob Gourley   Tyrell: The light that burns twice as bright burns half as long - and you have burned so very, very brightly, Roy. Look at you: you're the Prodigal Son; you're quite a prize! Batty: I've done... questionable things. Tyrell: Also extraordinary things; revel in your ti...
Bob Gourley The Global Connected Aircraft Summit, taking place June 6-8, 2016 in Los Angeles, CA, promises to deliver even more airline executives, thought-provoking case studies and valuable networking opportunities in 2016 than ever before. Now in its third year, the annual summit ha...
Bob Gourley The Army is seeking innovative micro-cloud management solutions and plans to award innovative prototype contracts over the next three months. BACKGROUND – The Army’s inaugural “Innovation Challenge” last May resulted in the purchase of four cutting-edge transportable high p...
In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power." This document was based on th...
Bob Gourley One thing we know for a fact, no cyber adversary is invincible. And another absolute fact is you can reduce your risks and mitigate many of the threats you face today. On Thursday 31 March 2016 join Cognitio for an overview of the threat in a fast-paced, action-oriented web...
This post provides an update on the ongoing battle between Apple and the U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police after the horrific massacre in San Bernadino on December 2, 2015. It is just days before the March 22, 2016 hearing in this long-running...
Bob Gourley This post is a follow on to our report "The Battle For Your Head Is Underway: VR from Oculus, Sony, HTC/Valve competing at GDC2016" So far we have seen nothing to change our overall conclusion. The Virtual Reality device you decide to select for your home or business use wi...
Bob Gourley GDC2016 is the largest game developer conference in the globe. By all accounts it will be the biggest yet for virtual reality. It has become so huge a sub-conference has been organized called the Virtual Reality Developers Conference (VRDC).  It expands beyond games to help...
Bob Gourley The 5th Annual Cloudera Federal Forum will be held 15 March 2016. For more and to register see: http://ctolink.us/1QXJwlM The event is a great opportunity to network with others in the federal data and analytics ecosystem, and a fantastic way to learn best practices, emergi...
Bob Gourley James Madison University is looking for an experienced professional to help serve and mentor the next generation of advanced intelligence analysts and has provided us with the job description below. Please look it over and share it with others that may have an interest: Ass...
Bob Gourley The 2016 RSA conference will be held February 29 - March 4, 2016 at the Moscone Center in San Francisco. This is the largest gathering of security professionals and vendors in the security ecosystem. Over 30,000 attendees are expected. As providers of strategic advisory ser...
Bob Gourley Fred Kaplan is the national security columnist for Slate and author of four other bestselling books examining some of the nation's most significant strategic issues. His book, The Wizards of Armageddon, captures the dynamics in the early nuclear age including the critical t...
Bob Gourley Cybersecurity and business risk professionals have watched ransomware evolve from a minor nuisance to a major threat capable of holding multiple systems at risk. Evidence of the rapidly evolving ransomware threat now includes an ongoing attack against Hollywood Presbyterian...
Bob Gourley Cognitio's Don Begley is one of the most connected business executives in the federal technology ecosystem. Don is highly regarded for his ability to help find the right solutions for critically important mission needs, and is one of the most sought-after mentors for those ...
Bob Gourley InterConnect 2016 is 21-25 February at the MGM Grand & Mandalay Bay in Las Vegas (side note: this event attracts so many forward thinking technologists and business leaders that there are very few venues large enough to hold it). This event is a great way to learn from ...
This post is the second in a series based on a discussion with Marc Andreessen. The first was on: AI, Robotics, Jobs and Accelerating The Future Gourley: Can you provide more context on what kind of education and training? Andreessen: It is fair to say I am biased on that subject but...
Bob Gourley The Whitehouse released a plan on 9 Feb 2016 that should be read and understood by cybersecurity professionals everywhere. Here is my take on the most important point: Whoever you are, wherever your are, you need to understand you are responsible for defending your technolo...
Bob Gourley DARPA funded research has produced a device, called the "stentrode," capable of direct recording of brain activity, right from neurons. This amazing technology repurposes stent devices to enable this breakthrough.  From the DARPA announcement: A DARPA-funded research team ...
Bob Gourley Time for another clear and unambiguous warning on the growing cyber threat, this one in testimony to Congress by the leader of the U.S. Intelligence Community: Security of Information systems: Allow me to turn now to a transnational threat that is, at present, difficult to ...
If you are an enterprise technologist or if you love thinking about the incredible future we can build for ourselves you no doubt already track the very interesting Marc Andreessen. His open sharing of views and context via his blog, on YouTube and his Twitter Feed are a great source o...
Bob Gourley This is the second in our bitcoin series. The first was an introduction to key concepts and terms around Bitcoin titled: Crypto-currencies and their promise for enterprise technology professionals. With this post we discuss a tool you can use immediately to work with Bitcoi...
Bob Gourley On 18 Feb 2016 the newly formed Defense Innovation Unit Experimental (DIUx) is hosting a townhall formatted discussion at their Mountain View offices designed to inform tech company CEOs and other tech leaders on some of the nuances to track when seeking to serve DoD missio...
Bob Gourley One of CTOvision's features is our curated list of the most relevant events of interest to enterprise technologists (see our Technology Events Calendar. This carefully selected list contains events we believe to be of high interest to our readers (many are events we will be...
Bob Gourley As savvy, informed technology professionals you possess something that could be of a huge help to research underway at Carnegie Mellon's Human Computer Interaction Institute.  They are developing what looks to be a very interesting approach to automated analysis to some typ...
Bob Gourley On 18 Feb 2016, Women In Technology present "The Promise and Peril of Big Data" For more and to sign up see: http://bit.ly/1S9t3wz Big Data has enormous promise for consumers and organizations alike. Big data makes it easier than ever to listen to, interact with, and connec...
Bob Gourley Bitcoin is hot right now. It is known as a crypto-currency, but has the potential to be applied to far more than exchanging value. Bitcoin is a protocol, one that many consider the next great protocol for the Internet and the emerging Internet of Things. As advanced applica...
Our list of Truly Useful Artificial Intelligence Tools You Can Use Today was out of date the minute we published it. We knew that would happen and are absolutely thrilled when we discover new capabilities that belong on this list. One we just learned about is EverLaw, provider of perh...
“If data analysis is Big Data’s "tip of the spear" when it comes to delivering data-dependent value to customers or clients, we also must address how that spear is shaped, sharpened, aimed, and thrown – and, of course, whether or not it hits its intended target.” In Meeting the Missio...
Gartner predicts that number of IoT devices in use worldwide will grow from an estimated 5 billion in 2015 to some 25 billion connected devices by 2020. The best business strategies will perfectly balance the ever-growing IoT market opportunities versus a rapidly evolving threat enviro...
Katie Kennedy The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker US to invest billions in self-driving cars - Los Angeles Times O'Malley: Upgrade technology to fight gun crimes - DesMoinesRegister...
Katie Kennedy The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Overnight Tech: State of the Union turns up light on tech - The Hill US must keep pace with China in cyberspace - FCW.com NASA Advi...