Posts By Bob Gourley

The Government’s Do Not Pay Portal, Predicting Gun Crimes, and More

The Office of Management and Budget and the Department of the Treasury launched the Do Not Pay site, an online portal to stop payments for individuals or organizations that have defrauded the government or are ineligible to receive government money. More here. The proposed Cyber Intelligence Sharing and Protection Act (CISPA) has been attacked byRead… Read more »

CTO Security Report

We have a lot of news on the mobile front this week; This is unsurprising given that the mobile sector is expanding so fast that some have taken to calling today the “Post-PC Era”. We all know very well that it’s not over yet, but it’s exciting to see such prolific changes in our day-to-dayRead… Read more »

The (Dis)Illusion of Control

[Editor’s note: This post from Michael Tanji of Kyrus-Tech first appeared at the highly respected national security blog Haft of the Spear. Follow Tanji online at http://twitter.com/mtanji -bg] Conventional wisdom is telling us that “assumption of breach” is the new normal. Some well-respected names in computer security would have you believe that the appropriate responseRead… Read more »

Cybersecurity Gaps Across Government, New Monitoring Tool, and More

This month, the Department of Energy, in working with the White House, Department of Homeland Security, and power companies, will test a voluntary reporting model to discover cybersecurity gaps in electricity delivery systems. More here. A researcher at the Department of Energy’s Pacific Northwest National Laboratory has developed a cyber sensor to track how networkRead… Read more »

Review: Cyberspace and the State

Cyberspace is an evolving medium, and the best strategic thinking about cyber dimensions of commerce, security, politics, and warfare is likely yet to come. I was happy, however, to read David Betz and Tim Stevens’ recent International Institute of Strategic Studies (IISS) monograph Cyberspace and the State: Toward a Strategy for Cyber-Power. It is aRead… Read more »

Datameer provides end-user focused BI solutions for big data analytics

Datameer provides a big data solution that focuses on perhaps the most important niche in this growing domain, the end-user. Here is an introduction from their website: Datameer leverages the scalability, flexibility and cost-effectiveness of Apache Hadoop to deliver an end-user focused analytics platform for big data. Datameer overcomes Hadoop’s complexity and lack of toolsRead… Read more »

The Future of Mobile (from FOSE 2012)

The future of mobile discussion highlighted some great facts of what is going on in mobile right now One of the sessions I attended at FOSE 2012 was titled: “What the Research Shows: The Future of Mobile.” It featured two researchers, Dr. David Metcalf of the University of Central Florida, and Aaron Smith, of theRead… Read more »

Fighting Cyber Crime with Transparency

Recently, I had the opportunity to participate in The Atlantic Council’s Young Professionals in Cyber Policy discussion with thinkers from industry, academia, think tanks, and policy. After speaking with Karl Grindal of the Cyber Conflict Studies Association, I realized that part of the reason for the current insecurity and high criminality in cyberspace is gameRead… Read more »

CTO Security Report

600,000+ Mac Computers Infected While this kind of activity wouldn’t rouse much attention from those esconced in WinTel (Windows and Intel) architechures, it is much less common for Mac users to be impacted by infections on this scale so quickly. The infection, called Flashback, is installed via a Java vulnerability (CVE 2012-0507) which was patchedRead… Read more »