Balancing the Sharing of Information

CyberSecurity Journal

Subscribe to CyberSecurity Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get CyberSecurity Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from CyberSecurity Journal
By Ryan KamauffFOSE is the nation’s premier event for government technology professionals who need tools, resources, and best practices to transition to the cloud, mitigate cybersecurity threats, and achieve the goals of the DGS while managing uncertainty and the critical need to make ...
London, 9 May 2013 - The Government Procurement Service has confirmed that Fujitsu UK & Ireland has been awarded a place on the relevant lots for 14 new services on G-Cloudiii, adding to the existing 28 standardised services the IT services expert already has available on the Cloud...
FTTH Council Asia Pacific Auckland conference approaches sell out and attracts leading industry keynotes worldwideMay 09, 2013 - Later this month in Auckland, New Zealand plays host to one of the most prestigious telecommunications conferences ever staged in the country, when the FTTH ...
Falls Church, VA, May 03, 2013 --(PR.com)-- For the third year in a row, Kore Federal has been named one of Virginia's 50 fastest growing companies, earning a spot on the 2013 Virginia Chamber of Commerce (VCC) Fantastic 50 list. The company, who provides advanced IT solutions suc...
By Bob GourleyThe following is the meat from our monthly tech trends report. You can have this delivered to your email each month by visiting our newsletter signup page. Over the last several months we continued to see foundations being established for dramatic positive change in the f...
By Bob GourleyDear readers, We really appreciate your inputs on all matters. Please keep your thoughts coming to us via any path easy for you. We would especially appreciate it if you take a minute to fill out our survey form below.  We are looking for information that can help us prod...
Concord, NC, April 25, 2013 --(PR.com)-- Kenyatta J. Fisher of Concord, North Carolina has been included in the Strathmore’s Who’s Who Worldwide Edition for his outstanding contributions and achievements in the field of information technology. About Kenyatta J. Fisher Ken...
Infosecurity Europe, London, UK - 24th April 2013: (ISC)²® ("ISC-squared"), the world's largest not-for-profit information security professional body and administrators of the CISSP®; and the Cloud Security Alliance (CSA), a not-for-profit organisation with a mission...
By Bob GourleyWith this post we would like to announce an upgrade to the CTOvision mobile application, available for download now from all mobile app markets. We also provide an overview on other important free features you can use to get your job done easier.   Announcing the CTO...
By Ryan Kamauff In this podcast Matt Devost, CEO of FusionX, joins us to discuss cybersecurity challenges and innovations in the pipeline. We talk about a variety of aspects, including; Script kiddies cracking passwords Outsourcing password cracking to the cloud A Change in Cybersecuri...
Last year, we saw three trends making lots of noise and a fourth one closely following – Cloud Computing, Big Data, Mobility, and Social networking for the enterprise. Let me comment on each one as we enter 2013. In cloud computing, the focus shifts to Platform as a Service (PaaS) a...
Marc Andreesen said recently that 2012 will be remembered as the year of SaaS. What he meant is that SaaS has been around for a while, but it came of age this year, with examples of successes such as the Workday IPO. No one questions the significance of SaaS any more. But the year 2013...
Forceworks Are you ready for the transition from Hardware-Centric to Software-Centric?Do you ever talk to an “Old” IT person? You know, like 40ish. Man, do they have some stories about how IT used to be back in the day. Things sure have changed a lot. You […]