Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
Editor's note: I was so excited to read of this year's inductees. All are great champions who have given to the community over decades.-bg BALTIMORE, Sept. 14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted i...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Will Subdrones Cause World War III? - Nextgov AREA ROUNDUP: FCW falls to No. 3 Tri-Valley - MyWebTimes.com Time To Spread The Word on Internet of...
The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts.  The FBI led Internet Crime Complaint Center ...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker NASA Invites Media to Explore Mars Science Fiction and Fact in Cinema How Can Agencies Balance IT Innovation and Cost Savings? - Nextgov GAO ding...
On 26 August 2015 the Department of Defense (DoD) published a new rule entitled the "Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018). You can read the details of this new rule here: This rule rep...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Mike Read Appointed to President of Teledyne Marine; Robert Mehrabian Comments Determining Who Should Be in Charge of Cyber Security Defensive te...
Security has quickly transformed into a major issue for most businesses. As headlines highlight the now common incidents of security breaches, where victims as large as Target, JPMorgan Chase, and Sony have to struggle to repair the damage, many companies are prioritizing their cyber s...
Fraud is pervasive and is seen in the form of social engineering, phishing attacks, insider threat attacks, and in attempts to extract money using false claims. Fraud especially presents major challenges in fields that include healthcare, visa applications, job applications, travel cla...
There are a variety of different styles of job training, but typically the most effective training happens when employees are actually at work. Employee development is important for a number of different reasons, and on-the-job training can provide unparalleled opportunities for employ...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Registration for 10 Nov 2015 FedCyber Summit Now Open Apple and Other Tech Companies Tangle With US Over Access to Data - New York Times Patent L...
FedCyber Conference co-chairs Matt Devost and Bob Gourley are pleased to announce that registration for the 10 Nov 2015 FedCyber Summit and Threat Expo is now open. Please reserve your seat today by registering here (as always, the FedCyber Summit is free for federal government employe...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure ...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Mitre to Support Auburn University’s Drone Pilot Training Program New Guidelines Require Warrants For Federal Surveillance of Cellphones - Yahoo ...
The video at this link and embedded below provides a review of eSentire's Active Threat Protection capabilities, an approach that combines managed security services and technology into a highly functioning capability to predict, prevent, detect and respond to attacks. One of the facts ...
The video at this link and embedded below starts with a great question: What is the difference between data governance and big data governance? Well we all know that the theory should be that there should be no difference. But the reality is that Hadoop and Spark and the many new appro...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Improved defense the key for FCW - MyWebTimes.com Federal grant to aid enrollment under Affordable Care Act; Delcross ... - Pittsburgh Post-Gazet...
Traditional video conferencing can be frustrating. In this virtual environment, not having the ability to see whom you are conversing with can be a great disadvantage. Speaking directly to each person in the group, like you are physically present, can be the presence needed to lead or ...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Soyuz Heads to Space Station with New Crew, Return Transportation for One-Year Mission Team EdWatch: Federal grant to Delaware Tech aimed at attr...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Purdue part of $171 million federal initiative - Journal and Courier US federal agent investigating Silk Road admits $800000 bitcoin theft - The ...
Editor's note: We have watched the market respond to the proactive, well engineered investment in information protection at FireHost, their years of work in enhanced security for customers has made them the market leading provider of highly secure cloud infrastructure. Now known as Arm...
An unavoidable fact of life is that data breaches can and will occur. The jury is still out on when and to what extent we will be able to reverse this situation. However, in the meantime, to avoid appearing on the “wall of shame” of major breaches that expose confidential information, ...
One of the most significant capabilities in the enterprise defensive arsenal is multi-factor authentication. There is no such thing as a single silver bullet that will mitigate all risks, but in today's world if you do not have multi factor authentication in place you are almost neglig...
In this three-part vodcast, Ian Lumb, Product Marketing Manager, discusses Version 7.1 of Bright Cluster Manager for HPC. In part one, Lumb walks the viewers through the most significant improvement in version 7.1. The new improvements add to the completeness and robustness of the prod...
Thanks to the organizers of the Integrate + API World 2015 Conference (Sept. 26-30, Santa Clara) we are able to give away up to 50 free OPEN passes to this very powerful event. Claim your Integrate OPEN pass here ($300 value) OR Get 30% off your Integrate PRO Pass (see pass types here)...
NIST, DHS and NSA are collaborating together and with professionals across industry to hold the Cybersecurity Innovation Forum 9, 10 and 11 Sep in DC. For more and to register see: http://www.fbcinc.com/e/cif/ The following is from the event invitation: 2015 Cybersecurity Innovation Fo...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Army tries to speed cyber acquisition process - FCW.com State Dept. IG chides diplomats for using private email Iowa testing digital driver's lic...
SAP's annual Solutions Summit is an opportunity to engage and lead the dialogue that is grounded in perspectives from national security leaders such as yourself, on critical issues facing the U.S. national security community.  The theme this year is “Human Critical: Empowering the Peop...
In 2011 the US Federal Government issued a Cloud First policy mandating that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. Cloud computing is a design style that allows for effici...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Scott Frohman Joins SAS as Federal Sales Director; Karen Terrell Comments Alcohol, Tobacco and Firearms CIO Announces Exit - Nextgov NASA Extends...
Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents such as the OPM Breach have heightened awareness of and sensitivity to this risk, and have made it even more critical that organizations asse...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Boardman schools get $350000 technology boost - Youngstown Vindicator Good People at @SecureNinja Provide Cyber Kung Fu Certified Ethical Hacker ...
SecureNinja has been a force for good in the community for years, providing education and training and contributing to many online and in person events and activities (including FedCyber). We have always loved these guys. But there is something I totally missed till now that I wish I w...
Im a huge fan of Software Defined Networking (SDN) and so many other related applications of advanced enterprise tech. But watching this video is giving me pause. It very clearly shows that current SDN implementations are full of weaknesses that could shift the SDN Utopia into a nightm...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Cheating site logged federal subscribers with sensitive jobs - Centre Daily Times Michael Stonebraker – MIT CDOIQ Symposium 2015 – theCUBE Senato...
The video here is another production by the great folks at SiliconAngle, here Paul Gillin and Dave Velante have a conversation with Michael Stonebreaker of Tamr covering topics of data and issues of integration, a problem everyone we know has. I really enjoyed hearing Michael's context...
Webtrends, a provider of web analytics products, services and solutions for more than 2,000 enterprises, now uses Hortonworks Data Platform (HDP) to run Spark on YARN. With Webtrends processing more than 13 billion online events every day, they sought a solution to dramatically improve...
The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker How to Get Ahead of 2016: Ensuring Federal IT Can Adapt to Leadership Transitions - Nextgov Homeland Security Today: Invincea Addresses Billion D...
Government-Wide Acquisition Contracts (GWAC) are pre-competed vehicles that enable any government agency to buy cost-effective, innovative solutions to meet information technology requirements. These vehicles are easy and fast for government to use, offering quick access to qualified I...
Founded in 1989, CMA is a value added reseller of information technology solutions and a leading provider of marketing, business development, and managed contract services in the government marketplace. CMA is a small business prime contractor holder of GSA Schedule 70, NASA SEWP V, an...
Berico Technologies is a Veteran-Owned Small Business (VOSB) that develops and delivers software solutions for the Department of Defense, Intelligence Community, select Federal Civilian agencies, and commercial customers. Berico is an E-SITE small business awardee (included in the elit...