MegaTrend Update: New Security Requirements and Capabilities

There are special technologies that need to be considered in modernizing approaches to ensuring security and risk mitigation. A short list of those we like include: Fixmo, Centripetal Networks, Invincea, Triumfant. There are also very important non-technological issues to consider in this domain, including the history of conflict in things cyber. For federal cyber security professionals: see FedCyber. Also see […]

Help Accelerate The Best Possible Future: Engage with @WashingtonExec K-12 STEM Symposium 8 March 2014

The WashingtonExec Inaugural K-12 STEM Symposium will held on March 8th in Herndon VA. The event is open and free for the public. This event is expected to bring 500 parents, students, teachers, corporate/government executives, and non-profit representatives. We are very much hoping you will be part of this activity. There is a real need of community […]

Virtuous Activity: GSA and DoD Announce A Well Coordinated Acquisition Cybersecurity and Resilience Recommendations

The GSA and DoD have just announced a new list of well coordinated recommendations for ways to enhance overall cybersecurity through better acquisition processes. Download it at this link: “Improving Cybersecurity and Resilience through Acquisition“. We view this as a critically important activity that will help enhance overall resilience of DoD and other US Government […]

Mobile, cloud computing are source of most healthcare security worries, Reverse auctions to help slash costs and more

By Ryan KamauffHere are the top cyber news and stories of the day. Survey: Mobile, cloud computing are source of most healthcare security worries – ‘The study, “The Risk of Regulated Data on Mobile Devices & in the Cloud,” which surveyed 781 IT and data security practitioners, found that 33 percent of respondents said that […]

Pentagon Five-Year Cybersecurity Plan Seeks $23 Billion, Cyber attacks focusing on Infrastructure, not Data and more

By Ryan KamauffHere are the top cyber news and stories of the day. Brace for malware-fighting IE, Office patches - Microsoft is finally patching the vulnerabilities in IE this week. The weakness is in versions 6-10 of the software. 19 of the 23 patches Microsoft is rolling out today are based around patching IE. Via ComputerWorld, […]

DSB Report on Cyber Security and Reliability in a Digital Cloud

By Bob Gourley Note: we previous summarized and pointed you to a closely related DSB report on Resilient Military Systems and the Cyber Threat. These two studies are related and the study teams held some joint meetings to help ensure the best possible recommendations for the department. The DSB Report on Cyber Security and Reliability […]

GigaOm Webinar: Countering targeted attacks with active defense strategies

Countering targeted attacks with active defense strategies Firewalls block basic attacks on your network, antivirus scanners filter known offenders, and no enterprise should operate without them. Still, focused attackers and zero-day exploits make short work of entrenched perimeter defenses, and every business should expect to be breached. To cope with these attacks, IT should build […]

Links To The Most Virtuous Technologies in the Federal Space

This is a list of technologies we believe to be of very high interest in the federal technology space. Each already has past performance and leadership teams with proven ability to scale and each has a very high potential of making positive change in how the government accomplishes its missions. Cloudera: Extract Benefit From All […]

Security-Focused Innovators From Industry, Government and Academia Gathering 6 August in New York

By Bob Gourley We have previously written about the very virtuous activities of the Security Innovation Network (SINET). This widely known, highly respected collaborative group seeks to advance the state of innovation in the cyber security domain. Information on a coming event you will want to track is provided below. I hope to see you […]

Centripetal Networks: Trusted Internet

I’m on the board of Centripetal Networks, a firm with dramatically virtuous technology that I believe will change the world. With this post I’ll tell you more about this firm, with a focus on the differentiators of their capability. The core capability of Centripetal Networks is a product called the RuleGate.  It is a very […]