Virtuous Activity: GSA and DoD Announce A Well Coordinated Acquisition Cybersecurity and Resilience Recommendations

The GSA and DoD have just announced a new list of well coordinated recommendations for ways to enhance overall cybersecurity through better acquisition processes. Download it at this link: “Improving Cybersecurity and Resilience through Acquisition“. We view this as a critically important activity that will help enhance overall resilience of DoD and other US Government […]

Mobile, cloud computing are source of most healthcare security worries, Reverse auctions to help slash costs and more

By Ryan KamauffHere are the top cyber news and stories of the day. Survey: Mobile, cloud computing are source of most healthcare security worries – ‘The study, “The Risk of Regulated Data on Mobile Devices & in the Cloud,” which surveyed 781 IT and data security practitioners, found that 33 percent of respondents said that […]

Pentagon Five-Year Cybersecurity Plan Seeks $23 Billion, Cyber attacks focusing on Infrastructure, not Data and more

By Ryan KamauffHere are the top cyber news and stories of the day. Brace for malware-fighting IE, Office patches - Microsoft is finally patching the vulnerabilities in IE this week. The weakness is in versions 6-10 of the software. 19 of the 23 patches Microsoft is rolling out today are based around patching IE. Via ComputerWorld, […]

DSB Report on Cyber Security and Reliability in a Digital Cloud

By Bob Gourley Note: we previous summarized and pointed you to a closely related DSB report on Resilient Military Systems and the Cyber Threat. These two studies are related and the study teams held some joint meetings to help ensure the best possible recommendations for the department. The DSB Report on Cyber Security and Reliability […]

GigaOm Webinar: Countering targeted attacks with active defense strategies

Countering targeted attacks with active defense strategies Firewalls block basic attacks on your network, antivirus scanners filter known offenders, and no enterprise should operate without them. Still, focused attackers and zero-day exploits make short work of entrenched perimeter defenses, and every business should expect to be breached. To cope with these attacks, IT should build […]

Links To The Most Virtuous Technologies in the Federal Space

This is a list of technologies we believe to be of very high interest in the federal technology space. Each already has past performance and leadership teams with proven ability to scale and each has a very high potential of making positive change in how the government accomplishes its missions. Cloudera: Extract Benefit From All […]

Security-Focused Innovators From Industry, Government and Academia Gathering 6 August in New York

By Bob Gourley We have previously written about the very virtuous activities of the Security Innovation Network (SINET). This widely known, highly respected collaborative group seeks to advance the state of innovation in the cyber security domain. Information on a coming event you will want to track is provided below. I hope to see you […]

Centripetal Networks: Trusted Internet

I’m on the board of Centripetal Networks, a firm with dramatically virtuous technology that I believe will change the world. With this post I’ll tell you more about this firm, with a focus on the differentiators of their capability. The core capability of Centripetal Networks is a product called the RuleGate.  It is a very […]

Cylance: Providing proactive cybersecurity products and services

Cylance, Inc. is a global provider of cybersecurity products and services that is changing the way companies, governments and end users proactively solve the world’s most difficult security problems. Through a holistic security process called Presponse™, a philosophical, practical and cyclical approach, Cylance couples the understanding of a hacker’s mentality with algorithmic intelligence and technology […]

NetAuthority: A focus on trusted devices

They focus on trusted devices From their website: NetAuthority reduces cyber security risks and prevents data loss by uniquely identifying and authenticating Internet-enabled devices. As a visionary leader in strong authentication, NetAuthority turns the device itself into the key or token for authentication. Every Internet connected device contains unique attributes which can be used to […]