Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
Are you responsible for network security?  Or do you manage security projects for your organization?  You may want to check out the  2015 Palo Alto Federal Forum on 20 May 2015 at the Newseum in Washington, DC.  This event is suitable for newcomers to Palo Alto Networks, as well as sea...
This post is part of our series providing background and context on sponsors of Cognitio's 30 April Synergy Forum. The platinum sponsor of the 30 April Synergy Forum is Carahsoft Technology Corp. We have known and worked with Carahsoft for years, they have become an institution in the ...
There are many conference models, all with strengths and weaknesses. This particular one, the Data Science Conference in Chicago Nov 12 and 13 is very unique and worth studying by anyone who attends or organizes events because of their approach. But as you can imagine by its title it i...
Thanks to Amazon.com we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special two day promotion running 23 and 24 April. The book was written to provide actionable insights into the cyber threat specially aimed towards t...
The yearly Data Breach Investigations Report (DBIR), conducted by Verizon with contributions by over 70 organizations from around the world, has become an important yearly marker on the state of enterprise security. We consider this report to be one of the most actionable of its kind b...
On 21/22 April in Fort Bragg, the Army met with Industry to brief them on their current and future needs and requirements (AFCEA TechNet Fort Bragg). Surrounded by a sea of uniforms, I was immediately humbled by the stories of how hard it still is to set up meaningful communications on...
The 30 April Synergy Forum provides a venue for government and industry leaders to exchange lessons learned and best practices. Cognitio's vision for this event is what makes it unique. This is not an event driven by a single vendor or reseller. And it is not driven by a single agency ...
Those familiar with the Apache Hadoop ecosystem are no doubt aware of Apache Spark and the potential it holds to transform data intensive analytics. Spark’s ties to Hadoop are tight and it is often seen as a possible replacement to the batch-oriented MapReduce framework, though its int...
Thanks to Amazon.com we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special two day promotion running 23 and 24 April. The book was written to provide actionable insights into the cyber threat specially aimed towards t...
New in the CTOvision Research Library: We have just posted an overview of an architectural assessment we produced laying out best practices and design patterns for the use of SAS and Apache Hadoop, with a focus on the government sector. Enterprises in government are awash in more data...
The article titled Minding The Analytics Gap  by Sam Ransbotham, David Kiron and Pamela Kirk Prentice, highlights the gap between an organization’s capacity to produce analytical results and its ability to apply them effectively to business issues.Key takeaway: XL Group plc, a global i...
Editor's note: I am an advisor to Invincea, and am very proud to share the press release below with you. Also of note, Invincea is a sponsor of our 30 April Synergy Forum.  -bg Invincea Redefines Endpoint Security with Integrated  Endpoint, Cloud Analysis and Enterprise Response Capabi...
By Dan Cybulski Late last month we introduced readers to Napatech’s high speed packet capture appliance, Pandion, announced at this years Mobile World Congress in Barcelona. Napatech has been providing industry leading network management and security accelerators to telcos, the financi...
By Charles Hall Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world's leading forums for enterprises and technical information security professionals. This year, the Conference will be held A...
By Charles Hall If you're interested in cyber security and operations at the federal level, check out the AFCEA Defensive Cyber Operations Symposium.  This event combines the  JIE Mission Partners Symposium and the International Cyber Symposium to increase dialogue among key participan...
By Bob Gourley Peter W. Singer, strategist at the New Ameria think tank and author of "Cybersecurity and Cyberwar: What Everyone Needs To know" and Sara Sorcher, deputy editor of The Christian Science Monitor's new cybersecurity section, Passcode, provide a monthly podcast of interest ...
By Bob Gourley On 15 April at 10am EDT Cognitio will present a webinar on the Cyber Threat. This presentation will examine the threat from the perspective of seasoned professionals who have spent years in direct contact with adversaries defending both corporate and government systems. ...
By Bob Gourley The paperback version of our book The Cyber Threat is now ranked by Amazon as the number one best seller in their White Collar Crime category. Most cyber threats today are associated by crime and we are very proud to be ranked so high in this category (the book is also t...
By Bob Gourley CTOvision readers are among the busiest people in the community, far too busy to waste time on attending the wrong event. We would like to help you as you consider which events warrant your time and attention. To address this issue we maintain the CTOvision Events Calend...
By Bob Gourley One of our more popular white papers (with over 2000 downloads) is titled "Advice for the Tech Startup CEO Considering a Federal Strategy." We have just updated this paper with new advice and actionable information relevant to any firm with advanced technology seeking to...
By Dan Cybulski It is no secret that insider threat is a serious issue that every organization is facing. A look back at 2014 reveals any number of breaches that can be traced back to malicious or exploited insiders. The 2014 Data Breach Investigation Report published by Verizon highli...
By Charles Hall Learn more about how to better protect your assets from cyber attack at the Palo Alto Networks  Federal Forum on 20 May 2015, from 8:00 AM to 5:00 PM at the Newseum in Washington, DC.  This all-day event brings representatives from industry, government, and technology t...
By Charles Hall Today's data-intensive analytic platforms offer a dizzying amount of data, originating from sensors, markets, social media, the Internet of Things, and countless other sources.   All this data can cause a significant delay in decision-making.  Organizations must stop re...
By Bob Gourley on 21 May at 1pm, CTOvision publisher Bob Gourley will host a webinar SAS engineers in an overview of architectural best practices for SAS and Hadoop. This webinar will examine lessons learned, best practices and concepts of operation designed to help you make the most o...
Imagine you are getting ready to fill your washing machine with all your of dirty clothes and when you are ready to close the door and fill up the detergent, you suddenly realize your detergent bottle is completely empty. A sense of panic washes over you and then the doorbell rings. Yo...
By Bob Gourley The CTOvision Research Library is a repository of research curated by our analysts to provide enterprise technologists a fast way to reference actionable information relevant to your operational decisions. Our analyst curate the research library into categories of Analyt...
By Bob Gourley Opptiv is a sponsor of Cognitio's 30 April 2015 Synergy Forum. Opptiv works with firms around the globe to bring more precision and less guesswork to acceleration of revenue and sustained growth. I've enjoyed working with them in the past and like the fact that they do t...
By Charles Hall CPPIB, Canada's largest pension fund, teamed with Permira, a European private equity group, to acquire Informatica (NASDAQ: INFA), the US data software and services company, in the largest leveraged buyout so far this year.  The companies will pay $48.75 per share in ca...
Messaging is a critical function for any organization. This is especially true for the Military and Intelligence communities, where it is imperative that vital messages reach intended recipients as quickly as possible. The first messaging system was hand-written notes. While functiona...
By Charles Hall Are you a system engineer or administrator charged with protecting your network infrastructure from attack?  Napatech's Field Programmable Gate Arrays (FPGAs) can help you to improve on the ability to monitor and react to malicious events that occur within your network....
By Bob Gourley It has been my pleasure to have the honor of working on the planning team for the 30 April Synergy Forum. This has been a great opportunity to interact with the DC strategy and technology community and I really look forward to seeing you all at this event. If you have no...
By Bob Gourley Learn about the cyber threat from seasoned professionals who have spent years in direct contact with adversaries defending government and corporate systems. This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making ...
By Bob Gourley There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives...
By Katie Kennedy Hortonworks has just announced their first hands-on, performance based certification exam. This new “HDP Certified Developer, ” or HDPCD, exam is designed for individuals who would like the opportunity to prove their Hadoop skills. Instead of multiple choice or true/fa...
By SeanLawson For decades, we have heard a lot of talk from American officials, industry experts, and others about the supposed threat of a “cyber 9/11,” “cyber Pearl Harbor,” “cyber Katrina,” or even “cyber Sandy.” In short, we have been warned repeatedly that “cyber doom” is coming. ...
By Bob Gourley Everyone I have ever spoken to about Thorn is a huge supporter of this group. We are so proud to have them involved with Cognitio's 30 April 2015 Synergy Forum. Thorn leveraged technology to combat the sexual exploitation of children. They partner with tech companies, go...
By John Mancini Editor's note: t’s been 14 years since SharePoint was first launched, so AIIM’s John Mancini takes the opportunity to look at where it sits in enterprises today and how it will be used in the future.-bg SharePoint, Microsoft’s web application framework and platform, was...
By Katie Kennedy Ford's newest technology plans to turn drivers into slower, safer drivers. Ford's "Intelligent Speed Limiter" tech will be able to read speed limit signs and keep your car at that speed, or alter your speed to the new limit. A camera mounted on the windshield scans the...
By Chris Ward The Navy knows it is falling behind in innovation. Constrained by a mountain of acquisition regulations, it has a hard time reaching across the Industry/Government divide to learn the “art of the possible”. CTOvision Pro readers can review our update on how the Navy inten...
By Bob Gourley Learn about the cyber threat from seasoned professionals who have spent years in direct contact with adversaries defending government and corporate systems. This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making ...