About Things Cyber: Cyberspace is our interconnected IT. It is the place where all our technologies come together into one.
Things Cyber is here to succinctly give you insights into the entirety of cyberspace, with a focus on getting the most out of your life. We help you operate your IT in a safe and secure manner.
We review the most critical components of the Tech Landscape, provide insights into Cyber Threats, give succinct recommendations on Protecting Your Information, review and point to the most interesting Tech Enabled Entertainment (including Sci-Fi), review Books and Tech Gear, give reviews of the best Tech Training, and keep it all in context with a healthy dose of Humor.
We believe computer security should be easy on users and do our best to share insights into the world of security in ways directly relevant to our readers. Dive into cybersecurity in the Things Cyber Protect Yourself section.
We also believe entertainment is critically important when it comes to successful optimization of IT. We see Sci-Fi of all forms as being helpful to expanding our thoughts about the future, and believe Sci-Fi fans are better prepared than most to conceptualize the best ways to configure and optimize today’s technologies, including insights you can use that will help you master the technology around you and help you drive optimal strategies for tech at work and in government.
Things Cyber’s algorithms track views of our content and categorize content in several unique ways. Hot Content is material that is seeing a rapid uptake in views. You are making those pages hot hot hot! Popular Content is the material that is our all time most popular for the site. Trending Content is new and of the new is getting the most attention and views.
We love when others talk about us, and are open to sponsorship discussion as well! Please see our Media Partnerships and Sponsorship page for more information.
And to start you on your way see:
- Tracking The Future of All Things Cyber
- Cybersecurity Technologies: What you need to know
- Internet of Things: What you need to know
- Robots and Robotics: What you need to know
- Big Data Analytics: What you need to know
- Artificial Intelligence: What you need to know
- Cloud Computing: What you need to know
For other properties see our Other Websites page.
Crucial Point LLC is a strategic technology and due diligence consultancy formed by Bob Gourley in 2007. Since then Crucial Point has served over 100 businesses across multiple sectors of the economy with advanced technology services including cyber security consulting, due diligence reviews, security engineering and federal market advisory services.
We serve high tech firms with advanced and particularly virtuous technologies by providing business growth consulting and services. We publish the community-focused CTOvision.com and ThreatBrief.com sites.
Bob is also the co-founder of the cyber risk consultancy Cognitio Corp. Bob is the author of highly regarded reference to adversaries in cyberspace, The Cyber Threat.
We help our clients understand. We do that with a network of serious information technology professionals. We help our clients implement solutions, especially highly scalable Cloud Computing based solutions.
All of our work is performed by thought leaders experienced in enterprise technology and focused on your mission needs. Our executives, PMs and analysts have experience in the entire technology stack from hardware, software, data and applications and every architecture from client server to cloud computing. We are versed in ITIL and CMMI and program management. We have a deep and intimate working knowledge of federal IT mission needs and the requirements of federal agencies.
We provide our CTO Advisory Services clients with unique success-focused capabilities through engagement teams led by the award winning Top 25 Global CTO Bob Gourley. Services include:
Strategic Consulting: Leverage experienced professionals with proven past performance. Our clients include major telecommunications firms, defense systems integrators and IT firms with dramatic, “game changing” technology. We also help highly regulated businesses and government agencies respond to a continuous stream of new mandates for cybersecurity compliance.
CTO Outsourcing and CTO-as-a-Service: Our model provides highly qualified, experienced Chief Technology Officer (CTO) or Chief Information Security Officer (CISO) leadership on your staff to manage and lead your technology partners, developers, engineers and IT support. We offer part-time, full-time, retained and hourly services. We also provide compliance services.
Technology Research: Our experts in technology can assess the relevance of technology prior to investment and prior to you bringing the capability into your enterprise. We prepare customized briefings on technology and provide context on IT focused on your needs.
Due Diligence:We support private equity firms, venture capital, and businesses looking to acquire other businesses. We can also help independently verify and place into context the discriminators of technologies in the firms you are considering.
Cybersecurity and CISO-as-a-Service Crucial Point provides architecture reviews and action plans for enhancing cybersecurity. We also provide analysis of solutions and products and strategies associates with cybersecurity, including market potential analysis, product offering development and marketing/messaging creation.
Government Market Evaluation and Support: We serve high tech companies who want to do business with the government. We can assist you in flattening the learning curve and will help you produce a winning strategy.