security

Cognitive Computing: Transforming Security in Cyberspace

As the world’s technology continues to rapidly advance over time, it’s clear that the reliance upon cyberspace will increase as well.  This has given rise to progressively complex cyber threats across the information processing realm – becoming increasingly more serious and frequent to every industry (40% increase in reported data breaches and incidents)  – and […]

Continue reading

Big Data, Watson, and Cognitive Computing: Improving Education and Regional Competitiveness

In the United States during 2013, nearly 20% of high school seniors did not graduate – stressing the ability of regions looking to thrive and prosper via an Economic Vitality agenda.  As we have seen, societies with world class education systems produce highly skilled workforces and become attractive places for businesses looking to thrive – […]

Continue reading

Watson – A Game Changer for Government

As we have observed over the past few years, the amount of data being generated in the world is so daunting that it’s increasingly unmanageable for most organizations – – as evidenced by the fact that typical organizations only use 12 percent of their data — leaving a wealth of untapped information to be leveraged […]

Continue reading

Mobile – Design for User Flexibility

Mobile is almost taken for granted nowadays. Most people, myself included, now feel pretty grumpy if you don’t have immediate access to the information that you seek, regardless of where you are. When mobile for business started, I carried around my own personal cell phone and a Blackberry provided by the Navy for work email […]

Continue reading

Cyber Security is more than just software on the network

There were two interesting speakers at the Atlantic Council Cyber Risk Seminar, one commercial (Dmitri Alperovitch, Co-Founder and CEO of Crowdstrike) and one government Tom Corcoran, senior policy adviser to the US House of Representatives Permanent Select Committee on Intelligence. An interesting point they made is that organizations should assume that their firewalls are penetrated […]

Continue reading

Smarter Security for Systems of Engagement

In early September 2014 I had the pleasure of presenting to the US EUCOM Cyber Endeavour in Graffenwoehr, Germany. This is a very short version of what I said! Four key areas of technology underpin our Smarter Planet vision – Cloud, Big Data / Analytics, Social Business & Mobile.  All are relevant to, and increasingly used by the military […]

Continue reading

Cyber Security and Network Defense – not the Maginot Line

I have talked to various defense organizations globally, and for a long time many thought that having a strong firewall and a good network administrator were the keys to a secure and successful cyber posture. From news reports alone it has become clear to all – that approach is only part of the solution, a […]

Continue reading

Global Convergence: Making public sector IT security controls not so different

For those of us focused on providing public sector IT solutions, it’s no big secret that industry specific and mandated security standards and accreditations don’t translate well to the private sector or commercial environments. Certainly governments are faced with different risks and threats that often necessitate a different approach or more stringent security controls than […]

Continue reading

Security Architects Or Security Architecture?

Security continues to be of paramount concern to government, large enterprise and anyone who uses an internet connected device. Yep, that would be everyone. However, nothing seems to be working to stem the tide of security breaches especially within large...

Continue reading

Security Jam Executive Summary released ahead of the NATO and G8 Summits

Just two weeks ahead of the NATO summit in Chicago and the G8 summit in Camp David, the Security and Defence Agenda and IBM released the executive summary of the 2012 Security Jam. This year’s Security Jam has again proven to be an inclusive dialogue with...

Continue reading

Don’t miss the 2012 Security Jam!

  With less than two day days until the Security Jam , join the thousands of experts and dozens of VIPs who have already registered and are looking forward to discussing their ideas and proposing solutions to pressing global security issues....

Continue reading