"This sounds like the classic attack of the late 1990s. A smart individual who knows the tools and the technology and is looking for glaring weaknesses in Internet-connected devices," Bob Gourley, a former chief technology officer (CTO) for the Defense Intelligence Agency, said. For more see: Fox … [Read more...] about Romanian hacker Guccifer: I breached Clinton server, ‘it was easy’
Bob Gourley Featured in CSO Online Art of the Hack
Rob O'Regan just posted an overview in CSO Online's "Art of the Hack", writing of the "3 ways to turn cybersecurity practices into competitive advantage." O'Regan interviewed cybersecurity experts and practitioners to build this piece, asking them how a business can turn its cybersecurity … [Read more...] about Bob Gourley Featured in CSO Online Art of the Hack
DC Cybersecurity Professionals Gathering 15 Dec at Cyber Playbook Event
On Tuesday 15 Dec at the Walter E. Washington Convention Center in DC cybersecurity professionals from across the public sector will gather with some of the nation's most capable technology vendors to strategize on ways to improve enterprise cybersecurity. This event, titled the 2015 Cybersecurity … [Read more...] about DC Cybersecurity Professionals Gathering 15 Dec at Cyber Playbook Event
ActiveCyber Interview with Bob Gourley – Former CTO of DIA
Bob Gourley Provides Forecasts and Recommendations for Active Cyber Defense: Bob Gourley the former CTO of DIA talks about the key trends impacting cybersecurity and how active cyber defense can play a role in this recent interview with ActiveCyber. For more see: ActiveCyber … [Read more...] about ActiveCyber Interview with Bob Gourley – Former CTO of DIA
This Simple Framework Can Help You Evaluate Your Security Posture
Our favorite cybersecurity model is the NIST Cybersecurity Framework. Here is a short overview of the mental bins of this framework: Understand and Identify: Organizations need to understand and identify cyber risks to business, assets which need to be protected, as well as resources … [Read more...] about This Simple Framework Can Help You Evaluate Your Security Posture
Cyber War: Sex, Fingerprints and Spear-Phishing
If a state like China was behind the OPM breach, as many analysts believe, it will most likely hold onto the information and exploit it. “An adversary like China, who knows a person’s weaknesses, can use that to intimidate or influence that person, and start them on a path to recruit them as a … [Read more...] about Cyber War: Sex, Fingerprints and Spear-Phishing
Experts Speak to Cyber Security in Aviation
Bob Gourley, who has an extensive background in cyber security and is currently publisher of both CTOvision.com and ThreatBrief.com, kicked off the session by laying out the intense landscape of cyber threats, which is becoming ever more scrutinized amid Government Accountability Office (GAO) … [Read more...] about Experts Speak to Cyber Security in Aviation
Mitigating The Risk Of Cyber Attacks Against Government Enterprises
On 15 April 2015, Chris Dorobek hosted a GovLoop discussion between Karen Evans, former CIO of the federal government and currently national director of the US Cyber Challenge, Alan Paller, the highly respected founder and research director of the SANS Institute, and me (Bob Gourley), a student of … [Read more...] about Mitigating The Risk Of Cyber Attacks Against Government Enterprises