Posts By Bob Gourley

50 Days of Lulz: A Retrospective

Last Saturday, the hacker collective Lulz Security disbanded after nearly two months of “high-quality entertainment at your expense,” stating that they had always intended to keep their campaign to 50 days and were not responding to heightened law enforcement pressure. Throughout their internet rampage, the hacker group was heavily hyped by the media, often forRead… Read more »

Plastic Privacy Monitor Filters Not Enough? Try This…

Many of you likely work with sensitive data on a regular basis. Whether it be classified government information, personally identifiable data, or any other type of data that should be protected, there are many ways to secure it in the digital domain. In fact, securing that data digitally is the easy part. What about theRead… Read more »

Hybrid IT Service Delivery

This post sponsored by the Enterprise CIO Forum and HP. Today’s users expect IT services and response to be immediate, interactive, connected and fluid. Delivering technology-enabled services is more important than ever and the most successful enterprises don’t just respond to this, they embrace it. Cloud computing promises the agility enterprises need. It helps deliverRead… Read more »

Enhancing Functionality and Security of your Enterprise with vPro

Enhancing Security Is a Full Spectrum Activity CTOlabs.com, a partner site of CTOvision.com, has just published a new guide meant to help further the awareness of the many new security features being fielded in today’s computer hardware. This guide, titled “Leveraging Hardware Design to Enhance Security and Functionality,” provides context, tips and strategies designed toRead… Read more »

CNO Part 2: Computer Network Defense

This is the second installation on my series about Computer Network Operations (CNO). The last blog explored the actions known as Computer Network Exploitation (CNE), and as always, please feel free to comment. Today, the topic switches from exploitation to defense. Computer Network Defense (CND): Includes actions taken via computer networks to protect, monitor, analyze,Read… Read more »

Planning continues for the FedCyber.com Government-Industry Computer Security Summit

Two weeks ago we pre-announced the FedCyber.com Government-Industry Computer Security Summit. On 28 September 2011 a small number of cyber innovators, computer security practitioners and information assurance experts will gather in an attempt to map out new paths for positive change in the cyber security dynamic.This summit seeks dramatically enhance the state of security andRead… Read more »

CTOlabs.com Assessment on “What You Need To Know About Hadoop”

More data is being produced than we can analyze! CTOlabs.com, a subsidiary of the technology research, consulting and services firm Crucial Point LLC and a peer site of CTOvision.com, has just published a white paper providing context, tips and strategies around Hadoop titled “What You Need To Know About Hadoop.” This paper provides a clearRead… Read more »

ZafeSoft Information Security and Control

It is with extreme pleasure that I announce ZafeSoft, a provider of solutions in information rights management and secure content in digital files/access control and use tracking, has named me to their advisory board. There are many exciting things about ZafeSoft that grabbed my attention. But the most compelling part of their story, to me,Read… Read more »