Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

The Bill Codifying The New Cybersecurity and Infrastructure Security Agency Is Short and Sweet


The Cybersecurity and Infrastructure Security Agency (CISA) was created out of several existing organizations within the DHS. CTO Cyber Security NewsThe nation has a new federal agency. The CISA was codified by a law signed by the President on 16 November 2018. I read what DHS said about CISA (see more here). Then thought I should spend a […].

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information.

Blockchain Technology can be Critical to IoT Infrastructure Security


Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […]. Blockchain and Cryptocurrency CTO News

Why “Build or Buy?” Is the Wrong Question for Analytics

What’s more, they gain the security of working with. infrastructure isn’t set up to scale with increased. informed decisions. workflows and security models. WHY “BUILD OR BUY?” IS THE WRONG QUESTION FOR ANALYTICS Introduction.1 When to Build Your Own Analytics.

Self-testing infrastructure-as-code


Version control brings the benefit that not only can you see what the infrastructure was, but you can also get reviews of changes by your peers before the change is made live; known to most developers as Pull Request (PR) reviews.

How Firecracker Is Going to Set Modern Infrastructure on Fire

The New Stack

One of the most exciting announcements from last week’s AWS re:Invent was Firecracker — an open source project that delivers the speed of containers with the security of VMs. As someone with a keen interest in the evolution of modern infrastructure, I am intrigued by Firecracker.

Continuous Delusion at the Infrastructure Layer


It has largely ignored the infrastructure layer. Infrastructure is more sensitive to a catastrophic change because if the infrastructure fails, everything fails. In effect, the “blast radius” of infrastructure failures is significantly larger than that of application failures.

Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’

The Parallax

As Dave Aitel, former NSA cybersecurity analyst and the current chief security technical officer of cybersecurity company Cyxtera tells The Parallax, the details of the indictment indicate the high level of confidence the Justice Department has in its charges. Regardless of U.S.

NSA leader to hackers: Cybersecurity’s a team sport

The Parallax

LAS VEGAS—It wasn’t so long ago that DefCon attendees enthusiastically engaged in the conference pastime “ Spot the Fed ”—clearly separating themselves from employees of federal organizations like the National Security Agency, if not demonizing them. Cybersecurity really is a team sport.

Sport 152

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

Fewer attendees, perhaps, expected him to reference the Hollywood action movies of Jean-Claude van Damme, who happened to be sitting in the front row for the highest-profile speech of Israel’s largest cybersecurity conference. Cybersecurity is a true blood sport,” Netanyahu quipped.

C³ Webinar: Awareness Briefings on Russian Activity Against Critical Infrastructure


The Department of Homeland Security (DHS) Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division and the National Cybersecurity and Communications Integration Center (NCCIC) are joining forces to conduct a series of unclassified, virtual awareness briefings on Russian government cyber activity against critical infrastructure. CTO Cyber Security Cyber War News

The Case for Minimalist Infrastructure

Stacks on Stacks

At Stackery , we believe in helping people create the most minimal application infrastructure possible. In addition, we had staging and dev environments with similar quantities of infrastructure. We had spent much more people-hours on security and ops than on development.

Digital Transformation Requires an Agile Storage Infrastructure

Hu's Place - HitachiVantara

With the explosion of data and the increasing demands on that data, data centers must focus more on the data and the information that can be derived from it than the storage infrastructure that supports it. However, the storage infrastructure, is still very important.

Snowball EC2 + vSphere: 2nd Generation Hybrid Infrastructure


When combined with a SDP-based Zero Trust Network, enterprises now have an infrastructure solution that offers a better cost structure, agility and security than any other design. AWS secure enclave application securityThe recent announcement by AWS of a physical Snowball EC2 compute platform represents a significant step forward in hybrid cloud/data center computing.

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. And not all federal cybersecurity decisions this year were necessarily harmful to consumers.

The Security – Automation Tango: Simple Approaches to a Robust IT Infrastructure Security

Armughan Ahmad - Dell EMC

Apparently, so does a secure IT infrastructure. A key pre-requisite for a modern datacenter is a robust infrastructure security. And, for a robust security to be effective, it needs to be intelligently automated. You need two to Tango.

AWS Snowball Edge And Hyper Converged Infrastructure Will Revolutionize Global Enterprises


When combined with a Hyper Converged Infrastructure (HCI) super computer and Zero Trust Network, enterprises across a broad range of vertical markets can transform their operational model. Big Data and Analytics Cloud Computing CTO Cyber Security News Amazon AWS hyper converged infrastructure vmwareThe recent announcement by Amazon AWS of a portable Snowball EC2 compute platform represents a significant advance in hybrid cloud/data center computing.

AWS 52

Nlyte: For Data Center Infrastructure Management


For an overview of Nlyte see the video of the video at this link and embedded below: Nlyte provides Data Center Infrastructure Management (DCIM) and Data Center Service Management Solutions (DCSM). Company Infrastructure Companies Security Companies Data center Nlyte

DHS opens new cybersecurity center to protect infrastructure, Amazon works issues of Rekognition, self-assessment to help against data breaches, Samsung’s IoT hub open to attacks


The following are some of the cybersecurity topics we are tracking: At DHS Announcement, Pence Blames Russia for 2016 Election Interference, Vows to Tighten Cybersecurity The United States government is preparing a major cybersecurity rehaul to protect key public infrastructure. US Department of Homeland Security announced on Tuesday the creation of a new center aimed [.]. CTO Cyber Security Cyber War News

Securing voting machines means raising funds

The Parallax

When the Senate failed to move the Secure Elections Act forward in August because of White House concerns over states’ rights , coupled with funding concerns, the United States lost its best chance this year of taking steps toward patching voting machines. Why current funding to secure U.S.

The Greatest Danger to Our Infrastructure Might Be Physical


In addition to intentional damage, infrastructure is vulnerable to accidents, as well as natural wear and tear. The importance of our infrastructure can't be underestimated, and a death caused by an accident or vandalism is beyond any dollar figure. CTO Cyber Security FBI

Server Infrastructure Security: Just How Valuable is It?

Armughan Ahmad - Dell EMC

Server security. As an IT leader, you understand the critical role that server infrastructure security plays in a company’s IT transformation. Today’s IT departments juggle multiple things at once, often struggling to keep up with changing security demands. It’s kind of a big deal. But we don’t have to tell you that. It’s a top priority that runs across all IT initiatives.

Discovering and proactively blocking malicious infrastructure


RiskIQ's PassiveTotal leverages the power of a well engineered sensor network and high power/high performance computing, and highly experienced analysts to help enterprise executives proactively block or otherwise disrupt malicious infrastructure. Bob Gourley.

Snakes in the Satellites: PassiveTotal provides an update on a massive adversary infrastructure


PassiveTotal is a clear master of this approach to "Infrastructure Chaining" for analysis. PassiveTotal could watch as an entirely new infrastructure was brought online. For more see: Snakes in the Satellites: On-going Turla Infrastructure. Bob Gourley.

Infrastructure vs. Application Security Spending

Jeremiah Grossman

A recent study published by 7Safe, UK Security Breach Investigations Report , analyzed 62 cybercrime breach investigation and states that in “86% of all attacks, a weakness in a web interface was exploited ” (vs 14% infrastructure) and the attackers were predominately external (80%).

Primer: The next act for security theater

The Parallax

The day after DefCon concluded this year, a prominent cybersecurity researcher and hacker known as the brain behind hacks featured on hit TV show Mr. Robot offered his resignation as the head of its security operations. Why are Androids less secure than iPhones? Security theater.

Hotels 162

Initial Assessment on NIST Coordinated Framework for Improving Critical Infrastructure Cybersecurity


Analysis Cyber Security Research Big Data cio CISO CTO cyber DHS You''re unauthorized to view this page. Why don''t you Login and try again.



Security, Trust and Privacy @ Planbox. Data encryption in transit and at rest Encrypted full backup every 24 hours Full data privacy and GDPR protection Multi-layered security approach Daily vulnerability scans and regular penetration tests Enterprise, social and native Identity Management Compliance with industry standards and regulations SAML 2.0 SSO for Enterprise customers Security. Systems Security. Creating, modifying and assigning security roles.

Data Center Modernization - Transforming Data Center Focus from Infrastructure to Information

Hu's Place - HitachiVantara

While the acronym IT stands for Information Technology and is synonymous with the data center, in reality the focus of IT has often been more on infrastructure since infrastructure represented the bulk of a data center’s capital and operational costs.

IntelliDyne’s ITAC Published Top 10 Tech Trends In 2015 For Government Enterprise Infrastructure Management


IntelliDyne’s ITAC is a thought leadership council focused on promoting innovation in Enterprise Infrastructure Management and technology solutions in government, comprised of IntelliDyne senior technologists and enterprise architects. By Katie Kennedy.

Internet Two Seeks Chief Cyberinfrastructure Security Officer


Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO reports to the Vice President for Network Services and will have responsibility for security across all Internet2 infrastructure programs. By Bob Gourley.

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC


By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management.

Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture


For the last several years the FFIEC has been making contributions to cybersecurity awareness , including initiatives aimed at helping financial institutions better understand and deal with cybersecurity risks. On 30 June 2015 the FFIEC released a new Cybersecurity Assessment Tool.

Microsegmentation – Secure Your Internal Network


Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Five Thoughts from the White House Summit on Cybersecurity and Consumer Protection


The Obama Administration deserves credit for putting together the first-ever White House summit on cybersecurity on Friday and – contrary to what some media coverage may lead you to believe – the U.S. Information sharing is only a means to an end. Analysis CTO Cyber Security endgame

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers


Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

CTOvision Now Curating Reference To Cyber Threat Intelligence Companies


CTOvision seeks to provide information that helps enterprise technologists succeed. Our CTOvision Pro members can easily access these curated categorized lists in the following topic areas: Analytical Tools | Big Data | Cloud Computing | Cyber Intelligence | Communications | GreenIT | Infrastructure | Mobile | Security | Visualization |.

Assessing the FFIEC Cybersecurity Assessment Tool


For the last several years the FFIEC has been making contributions to cybersecurity awareness , including initiatives aimed at helping financial institutions better understand and deal with cybersecurity risks. On 30 June 2015 the FFIEC released a new Cybersecurity Assessment Tool.

Tools 99

Game Change: Three Reasons Why #SonyHack Will Change Security


The White House declares it’s a national security issue and leaks intelligence that North Korea is behind the attack. Most corporate hacks we see are focused on either customer data (credit cards, medical records, social security numbers, passwords, bank account information, email addresses) or company proprietary documents. In a field that is still in its infancy — Information Security — the #SonyHack I believe will emerge as a Game Change moment.

Games 73