Posts By Bob Gourley

The Art of Network Operations

As I’ve discussed in previous posts, creating a strategic network has many parallels to building a computer network. In this post we’ll discuss how to keep that network running and how to optimize it for your professional and personal benefit. Managing your strategic network is more of an art than a science, but there isRead… Read more »

Instability in the Cyber Environment

Continuing where James Mulvenon left off at the the Cyber Statecraft Initiative‘s and the Cyber Conflict Studies Association‘s ”Addressing Cyber Instability” event, Greg Rattray, CEO of Delta Risk and former Commander of the Operations Group of the Air Force Information Warfare Center, spoke on “Instability in the Cyber Environment” at the Atlantic Council on JulyRead… Read more »

CYBERCOM Plans to be Ready for Anything by 2014, WikiLeaks Data Forecasts Afghanistan Violence, and More

Here is today’s federal cybersecurity and information technology news: General Alexander says that he will develop his workforce at U.S. Cyber Command to be able to handle any threat by 2014. More here. Researchers at the National Academy of Sciences were able to predict insurgent activities in Afghanistan by analyzing logs released by WikiLeaks. MoreRead… Read more »

A look at the new Google Nexus 7 Tablet

The Nexus 7 is here to save us all from having to buy iPads Announced just scant weeks ago, the Google Nexus 7 is an Asus and Google joint venture to creating a full tablet experience without any skin on top of it. Asus has long created strong 10″ Android tablet offerings, but this isRead… Read more »

The FBI Wants to Read Tattoos, Widespread Industrial Control Software Vulnerability, and More

Here is today’s federal cybersecurity and information technology news: The Transportation Security Administration has failed to comply with a year-old U.S. Court of Appeals order to hold public hearings to decide on body scanner rules and regulations. More here. The Federal Bureau of Investigation is seeking technology that can spot criminals and terrorists by recognizingRead… Read more »

Identity and Reputation in the Age of Big Data

Editor’s note: The following was written by Kord Davis from a post originally at KordIndex. Kord is the author of a forthcoming book on Ethics of Big Data. – bg The Hypothes.is Reputation Workshop is exploring some great topics on how identity and reputation are being influenced by big data. Identity and reputation are twoRead… Read more »

Aftershokz Bone Conducting Headphones: A New Way To Listen

Bone conducting headphones, which transmit sound through your skull rather than your eardrums, are not new. They have been in use by special operations and SWAT teams around the world and have been available for commercial purchase for years. Initial offering, however, were expensive and performed poorly until Aftershokz entered the market with offerings betweenRead… Read more »

The Defense Department Cloud Computing Strategy, Homeland Security Iris Scans, and More

Here is today’s federal cybersecurity and information technology news: The Department of Defense has released its Cloud Computing Strategy for transitioning to cloud services. More here. The Department of Homeland Security is exploring biometrics such as iris and facial scans for uses from law enforcement to the Trusted Traveler Program. More here. The Department ofRead… Read more »

Stability and Instability in National Security

On Tuesday, July 10, the Atlantic Council’s Cyber Statecraft Initiative and the Cyber Conflict Studies Association held another excellent event on “Addressing Cyber Instability“. The event marked the launch of CCSA’s new capstone report, Addressing Cyber Instability, which previews and discusses the CCSA’s upcoming monograph on the subject. The first speaker to discuss the topicsRead… Read more »

Latest TwitChimp Features: Multiple lists per account

This note provides an update on our new Twitter list management system. TwitChimp is a Twitter list curation tool. It provides users with better ways of creating, managing, synchronizing and sharing Twitter lists. It also provides those seeking advice on who to follow to find expert opinions and also provides gist tools to enable usersRead… Read more »