Posts By Bob Gourley

CNO Part 1: Computer Network Exploitation

This is the first part in my series about Computer Network Operations (CNO). Again, I welcome any and all discussion on the matter and hope that this post will help educate our readers and encourage dialogue between them. Computer Network Exploitation (CNE): Includes enabling actions and intelligence collection via computer networks that exploit data gatheredRead… Read more »

SSL : Implementation Gone Wrong

Image via Wikipedia During the recent security conference Hack In The Box, security researchers from Qualys Labs showcased the fruits of their efforts to scan the Internet’s websites for proper implementation of security features like SSL and its successor TLS. What they found could only be described as dismal. SSL stands for Secure Sockets Layer,Read… Read more »

The Security Development Lifecycle (SDL)

Writing secure code is absolutely critical. It requires training, experience, education and process. In the modern world software gets very complex, and doing it securely requires a scientific approach. A discipline has arose to meet this need. In this discipline a handful of heros have arose. With this post I’d like to focus on oneRead… Read more »

Track Mega-Trends in National Security with new KippsDeSanto Corporate Web Site

KippsDeSanto is an investment banking firm with an outstanding reputation in the national security and advanced technology sectors. The leadership of the firm have demonstrated a proven commitment to community building and in doing so have built a very virtuous system that delivers value to a wide range of stakeholders. Every person I’ve ever metRead… Read more »

Announcing the CTOlabs.com YouTube Channel

Dear Readers, With this post I would like to alert you to a new resource that we hope will become part of your self training and education activities, a YouTube Channel for CTOlabs.com. Our channel is a place where we can pull together videos we upload or videos we have found uploaded from others thatRead… Read more »

A Discussion About Computer Network Operations

In a networked world, as in the rest of the world, we have to keep ourselves protected from attacks. The problem is, this networked world actually exists in a different domain than we are historically used to fighting in. Of course, I am talking about the cyber domain. The United States has long enjoyed aRead… Read more »

Interested in Cyber Security? Read (and support) the new Cybersecurity Legislative Proposal

On 12 May 2011 the Obama Administration unveiled its cybersecurity legislative proposal. The entire proposal is available for your review at this link: cybersecurity legislative proposal. But I most strongly recommend you read the context provided by the government’s Cybersecurity Coordinator and Special Assistant to the President Howard Schmidt first. Howard provided a clear introductionRead… Read more »

How is the DoDIIS Conference Going?

Several of the CTOvision.com/ Crucial Point team, including RyanKamauff, BobGourley, AlexOlesker, have been at the DoDIIS Worldwide Conference, immersing ourselves in presentations, attending demos, visiting technology providers and integrators on the expo floor, and networking with people we admire and respect. While here we have also been collecting video and photos of several key technologies.Read… Read more »