Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bob Gourley

Machine Learning May Be the Solution to Enterprise Security Woes By Karl Zimmerman For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That's one of the reasons executives often discover security breaches when an external researcher - or worse, a journalist - gets in touch to ask why hundreds of millions of logins for their company's services are freely available on hacker forums. The huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterprise security teams in a difficult spot. Finding potential security breaches is like finding a tiny needle in a very large haystack - monitoring millions of connections over thousands of servers is not something that can be managed by a team of humans. Enterprise security is often preventative: we ... (more)

Megatrend of #ArtificialIntelligence | @CloudExpo #BigData #AI #ML #DL #IoT

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into homes and businesses and especially with the growing power of smartphones and other mobile devices. Artificial int... (more)

CTOvision Assessment On The Megatrend of Cybersecurity

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into the trend of enhanced Cybersecurity. We can make a prediction with absolute certainty: In the future, cybersecurity will be […] ... (more)

Enterprise Security and Functionality Benefits of the new Software Defined Perimeter (SDP) Approach

Bob Gourley The dynamic nature of today’s IT Operations has eroded the network perimeter in ways we have all been watching and even cheering on! This is a new world of mobility, cloud computing and rapid partnering for success. But the erosion of the network perimeter is making traditional security a roadblock to efficiency. No one wants to allow holes to be poked in the security system but no one wants to shut down connectivity to partners either. The Software Defined Perimeter uses software techniques to render the internal environment invisible to all outsiders, unless trust ... (more)

Choosing Your First Programming Language

By BryanHalfpap Many new programmers struggle when it comes to selecting their first language to learn.  Which is easiest, the most professionally useful, the most newbie-friendly?  Lets find out by showing you a range of options, their strengths and weaknesses, and some information about the most common programming languages in demand today.  At the end, we’ll make some recommendations and you’ll understand a bit more about why they were chosen. The Task At Hand Every job requires the right kind of tool, and each programming language can be thought of as a separate tool.  Just... (more)