This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have.
Muliro has also been appointed as HotelOnline’s chieftechnologyofficer. HotelPlus has built an impressive commercial organization, with skilled sales people, a high-performance reseller network covering more than a dozen countries across the continent.
Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Manual remediation is costly and requires manpower and time you don’t have.
The threat landscape has expanded,” said Mr. Moran, “because now there are more actors pursuing capabilities to breach networks… the diversity of actors is shocking.” — Michael Nelson (@MikeNelson) July 30, 2014. — Matt Devost (@MattDevost) July 30, 2014. — Matt Devost (@MattDevost) July 30, 2014.
Palo Alto Networks has just announced a new public sector advisory council and the addition of Ryan Gillis to the Palo Alto Networks team as Vice President of Government Affairs and Policy. Additionally, Palo Alto Networks CEO has been appointed to the President''s NSTAC. By Bob Gourley. Santa Clara, Calif., Santa Clara, Calif.,
A look back at 2014 reveals any number of breaches that can be traced back to malicious or exploited insiders. Interestingly enough, Palo Alto Networks is working on ways to help its customers leverage the high fidelity data coming out of its Enterprise Security Platform.
.” Before starting Grip Security, co-founder and CEO Lior Yaari actually spent some time as the CTO of YL Ventures (though he says he still had to go through the firm’s standard vetting procedure to get funding). Like his co-founders, Idan Fast (CTO) and Alon Shenkler (VP R&D), Yaari also has a deep cybersecurity background.
On 30 July 2014 in Reston Virginia some of the greatest minds in analytics for business outcomes and mission impact will be gathering at the Hyatt Regency Reston. This event, the Analytics 2014 Forum, is being pulled together by the United States Geospatial Intelligence Foundation ( USGIF ) and our team at Analyst One. By Bob Gourley.
Tapping Global Threat Intelligence To Secure Enterprise Networks. August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. Chris Petersen, CTO/Co-Founder of LogRhythm. .
Former CIA CTO Gus Hunt Joins Venture Capital Firm Artis Ventures’ Board of Advisors. 27, 2014 (GLOBE NEWSWIRE) — From his office in Langley, Va., former Central Intelligence Agency CTO Gus Hunt made some of the government’s most important technology decisions. – bg. San Francisco, Feb.
Today we’re talking to Frank DeGeorge, CTO at Impact Networking. We discuss what went into Impact Networking’s “best workplace” award, the ways in which Frank thinks about business evolution from his perspective as CTO, and how AI continues to change the game for his operations.
By Deepak Kumar Editor’s note: This guest post is by Deepak Kumar, Founder and CTO of Adaptiva. New technologies like these are delivering dramatic efficiency gains in many areas; however, they are stressing infrastructure and creating unrealistic expectations. CTO Cyber Security DoD and IC Mobile' – bg.
16-21 Nov 2014 the International Conference for High Performance Computing, Networking, Storage and Analysis (SC14) was hosted in New Orleans and once again it did not disappoint! With that in mind I thought I would tak. To read more please log in.
With this post we would like to give you a high level overview of their Spring 2014 Cohort. Our products can integrate with existing solution suites and instantly detect and pre-empt abnormal behavior in devices and networks without compromising performance or privacy. CardKill Inc. Fast Orientation, Inc.
The inaugural PentahoWorld conference is scheduled for October 8-10, 2014 at the Hilton Orlando Bonnet Creek in Orlando, Florida. Networking with industry experts, customers, and partners. Analysis Big Data CTO DoD and IC Data integration Orlando Florida Pentaho PentahoWorld' Bring Your Data to Life. Next Steps to Learn More.
CTO Cyber Security DoD and IC Mobile Amanda Knox Android Fixmo Google Innocence Network Mobile World Congress samsung Security' The real reason to watch is to get an overview of their well engineered approach and how it has evolved over time to the benefit of enterprise users.
By Bob Gourley It is time we all began to focus more on the coming age of a totally networked, software-enhanced, continually enhancing, device enabled world. Rodney Brooks, CTO and Chairman of Rethink Robotics. Now you have an opportunity to help shape this coming age by participating with other thought leaders to build the future.
By Bob Gourley The agenda for the 3rd Annual Cloudera Federal Forum (6 Feb 2014, Hanover MD) has firmed up and will no doubt lead to an incredible event. 7:00 AM Registration, Networking and BreakfastGeneral Session. Tom Reilly – Chief Executive Officer, Cloudera. If you have not registered yet please do so now.
In 2014, Teijeiro and his co-founders — one of whom is his brother, Alvaro, the CTO — turned the RecargaPay website into an app. While this may sound insane, previously, Brazilians could only call others who used their same cell phone carrier — if they called people in other networks they’d incur a hefty fee.
We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. December 3 & 4, 2014 – The National Press Club. Networking Lunch – Information Sharing Hour. Register Here. about SINET.
Baillie Gifford led the equity financing, which brings Honor’s total equity raised to $325 million since its 2014 inception. The funding news comes just two months after Honor revealed it had acquired global home care provider Home Instead in a move that greatly expands its senior care network.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
Editor’s note: I’ve referenced before my participation on the board of Centripetal Networks , and their ability to deliver large scale commercial solutions of MITRE’s IBIP are an area I am particularly proud of. In February 2014 they published a succinct overview on the topic which you can find at this factsheet.
The following is from the RSA conference press release : Congratulations to Red Owl Analytics for being named the Most Innovative Company at RSA Conference 2014! Gerhard Eschelbeck, ChiefTechnologyOfficer and Senior Vice President, Sophos. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'
Some weren’t prepared to accept online orders and others didn’t have a delivery network. Startups, like Fudo , stepped up with technology to get restaurants back on their feet. That independent restaurant customer, most likely adopting restaurant operation technology for the first time, is who Fudo is targeting.
Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? ChiefTechnologyOfficer. Chief Information Officer. Principal and CTO, Global Consulting Technology.
On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. This means designing early at the device and platform and network. Responding effectively and quickly is fundamental when an enemy infiltrates a network.
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. Presented by Cloudera. Bob Gourley.
“ Both leverage Coupang’s vast logistics network and Coupang has the largest directly employed delivery fleet in South Korea with over 15,000 directly employed drivers.” ” Former Uber CTO Thuan Pham joins South Korean e-commerce leader Coupang.
I spent six years as a CTO and moving from one cloud to another isn't something I even remotely considered. This isn't exactly a new idea—Heroku launched in 2007, and AWS Lambda in 2014. It's very clear right now that Cloudflare is doing an amazing job owning the stack all the way from developer experience to networking equipment.
2014 Edition), Galaxy Note Edge, Galaxy Alpha, Galaxy Tab S 8.4, and the Galaxy IPSEC Virtual Private Network (VPN) Client to the Commercial Solutions for Classified (CSfC) Program Component List. The listed Samsung devices are available for use with classified government networks and data. Galaxy Tab S 10.5
Date: Thursday, May 15, 2014 Time: 2:00 pm EDT Guest Speaker: Dave Shackleford Shackleford is Lead Faculty at IANS, founder and principal consultant with Voodoo Security and has consulted with hundreds of firms in security, regulatory compliance, network architecture and engineering. To sign up visit: [link].
A good deal of effort goes into migration of existing network security infrastructure, and more importantly network security policies, to support cloud services. With these findings, organizations are struggling to address the rapidly formalizing set of complex security management issues related to the evolution of networking.
In this multi-part series, I talk with some of the leading experts across various layers of the stack — from networking infrastructure to application infrastructure and middleware to telemetry data and modern observability concerns — to understand emergent platform engineering patterns that are affecting developer workflow around cloud-native.
And security is what brought them to the 2014 RSA conference. on 24 Feb 2014 Red Owl was named " Most Innovative Company " at the event. Analysis Analytical Tool Companies Big Data Companies Company CTO CTOvision Disruptive IT List DoD and IC Security Companies' Quite an honor. That''s where RedOwl comes in.
December 19, 2014 FBI National Press Office (202) 324-3691. The FBI has determined that the intrusion into SPE’s network consisted of the deployment of destructive malware and the theft of proprietary information as well as employees’ personally identifiable information and confidential communications. Washington, D.C.
April 11, 2014. – The National Geospatial-Intelligence Agency this week joined GitHub, a popular social network that allows programmers to collaborate and share computer code between users. The network allows developers to modify, distribute and perform work on the code – either to improve NGA’s product, or for their own use. “Our
FedCyber will be held on 5 Nov 2014 at the Tysons Corner Marriott. This is a great opportunity to work directly with peers in the federal technology ecosystem to enhance the cyber security of your organization and to share lessons learned. Our 2014 agenda for FedCyber is shaping up and you won’t want to miss it.
While the most important driver in today’s business atmosphere may be increased technology innovation, a new study indicates that IT professionals worry leadership is not doing enough to adopt … Read more on Midsize Insider. “If you’re not already spending a lot of capital in … Read more on NewsFactor Network.
None of them were really about technology. The really interesting stories, at least from a CTO perspective, are big technology mega trends that are forcing change and positive improvements in enterprise IT. 2013 saw many government technology professionals begin to examine this construct. Did I miss any?
As the cable and broadband industry surges ahead into a new era of ubiquitous connectivity, it is critical for CableLabs to continue building technologies that enable one cohesive and seamless ecosystem. At DISH, she served as the Chief Wireless Architect and Vice President of Technology Development.
Area Recognized for Extraordinary Talent, Inspiring Leadership and Success in the Technology Community. Fairfax, VA (PRWEB) January 23, 2014. Women in Technology (WITSM), the premier organization contributing to the success of professional women in the Washington, D.C.-area Analysis Big Data CTO' Lisa Hook, Neustar.
Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. FAIRFAX, VA—April 7, 2014 —Invincea, Inc., The company is venture capital-backed and based in Fairfax, VA.
Haystax Technology Names Advisory Board Members. McLean, VA – January 14, 2014 – Haystax Technology, Inc. He completed his career as the CIA’s CTO, where he was responsible for ensuring that the agency’s technology investments matched the needs of its mission. • Bob Gourley, Founder and CTO, Crucial Point LLC.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content