Posts By Bob Gourley

Legislation May Give Budgetary Power to CIOs, Army Investigates Analytics Software, and More

Here is today’s federal cybersecurity and information technology news: Proposed legislation would give federal chief information officers authority over their technology budgets. More here. The Army is investigating how the 3rd Infantry Division obtained free intelligence software from analytics company Palantir and has ordered the Palantir-provided training servers shut down. More here. The U.S. AirRead… Read more »

Internet Freedom Legislation, Big Data Solutions for the Intelligence Community, and More

Here is today’s federal cybersecurity and information technology news: The White House is working with the Department of Homeland Security, the Federal Bureau of Investigation, and others to draft their cybersecurity executive order. More here. The Senate Foreign Relations Committee unanimously approved a non-binding resolution calling on the United States to prevent the United NationsRead… Read more »

Increasing Battlefield Bandwidth, Laws and Norms for Cyber Attacks, and More

AEHF satellite concept Here is today’s federal cybersecurity and information technology news: Harold Koh, the State Department’s chief legal adviser, declared that the United States believes that cyber attacks are subject to humanitarian and war laws. More here. The Defense Advanced Research Projects Agency wants to put electromagnetic and acoustic sensors in icebergs to monitorRead… Read more »

Webinar to Examine Telework Security Practices

on 26 Sep 2012 at 1pm ET InformationWeek will be holding a webinar which will include an examination of several security concerns and mitigation steps regarding federal government telework. The following is from the InformationWeek write-up: Strengthening Security Protocols for Teleworking Employees An InformationWeek Government Webcast The US Office of Personnel Management (OPM) reports federalRead… Read more »

Bob Gourley on the Ethics, Analytics and Future of Big Data

Bob Gourley, editor of CTOvision as well as founder and CTO of Crucial Point, LLC, was recently interviewed by WashingtonExec, where he shared his views on emerging information technology, government needs, and Big Data. The original article can be found here, and the interview is reproduced below: How does Bob Gourley, founder and CTO ofRead… Read more »

Air Force Continues “Google Earth on Steroids” in Afghanistan, Undercover Police Use Smartphones as Wires, Earpieces, and Cameras, and More

Here is today’s federal cybersecurity and information technology news: The Department of Defense announced its a DoD Safe Helpline Mobile Application to combat anxiety, depression, and symptoms of post-traumatic stress. More here. The Air Force has awarded contracts to continue operating its advanced aerial Angel Fire sensors jointly developed by the Air Force Research LaboratoryRead… Read more »

Please submit by Friday for the Government Big Data Solutions Award

If you are a government IT leader or a firm that serves government please take a moment to give us your thoughts. We are looking for Big Data solutions in the government space that are making positive contributions to government missions. Nominees for the Government Big Data Solutions Award will be evaluated by a panelRead… Read more »

Lessons From Our Cyber Past: Examine the history of Cyber Intelligence with the Atlantic Council Cyber Statecraft Initiative

On Thursday September 27, 2012 from 3pm till 5pm the Atlantic Council will host a focused panel discussion on the history of all-source intelligence support to cyber operations. There are important lessons to be learned from this history, and we expect many lessons will be underscored at this fast-paced panel. The following is from theRead… Read more »

Practical ARM Exploitation Course Offered 9 Oct in Sterling VA

Friends and associates at Kyrus (Kyrus-Tech.com) recently announced they will be hosting Practical ARM Exploitation Course. This is the extremely popular course maintained by Stephen C. Lawler and Stephen A. Ridley. Exploitation is harder and a bit more nuanced today than it was in the past with the advent of protection mechanisms like XN, ASLR,Read… Read more »