SYS-CON MEDIA Authors: Mat Mathews, PR.com Newswire, David Smith, Tim Crawford, Kevin Benedict

Blog Feed Post

New Video: Automating Your Cyber Defenses Including Malware Removal

By

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise.  It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

Additional context into this topic is available in our research report downloadable here: 

Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 208 times – 918 kB

 
This paper Automating Removal Of Advanced Threats (208 downloads) captures the results of a review of industry technology trends, community standards for information exchange, CISO lessons learned in the domain of automation, and enterprise IT mission needs to produce a draft list of requirements which can be a starting point to accelerate the modernization of your cyber defense enterprise.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.