Sony Baloney

Hack at Sony Pictures exposes other cybersecurity issues: ignorance, hype, and the lack of a national and International strategy.


NAC Renaissance

Mobile devices, cloud computing, and security concerns are driving increasing use of granular network access controls.


Cisco Acquires Neohapsis: A Sign of the Times

Security services firm can help Cisco support customers, capitalize on growing services opportunities, and pull product sales


Cybersecurity Skills Shortage Panic in 2015?

Global cybersecurity skills shortage and high demand could lead to high turnover and hyper wage inflation next year


CISOs Should Become Proactive and Influential in SDN Planning, Deployment, and Strategy

Networking team will take the lead but security professionals should participate and provide input


Cybersecurity Recommendation: Don't Poke the Bear

Sony hack may illustrate the downside of picking a fight with skilled cyber adversary


SDN Networking Followed by SDN Security

As SDN technology is deployed on production networks, CISOs should be well along the way with SDN security projects.


Confusion Persists around Cyber Threat Intelligence for Enterprise Organizations

Enterprises have specific questions but government and industry responses are nebulous at best.


Time to Address Basic Organizational Issues that Impact IT Security

CEO must deal with fundamental weaknesses related to IT organization and status quo behavior if they really want to improve their cybersecurity strategies


Book Report: Tubes: A Journey to the Center of the Internet

Worthwhile read for those who want to understand the where the Internet resides and what it looks like


Trend Micro for Enterprise Security

North American image of Trend as an AV vendor is inaccurate and a disservice to the company. Enterprise security professionals should know better.


Intel Security oppportunities and challenges

McAfee FOCUS event demonstrates that Intel Security is well positioned for enterprise cybersecurity leadership if it can communicate its strong portfolio, hold customers’ hands, and avoid distractions.


What IBM can learn from its own cybersecurity business

IBM’s fortunes in cybersecurity improved substantially when it abandoned its internally focused strategy and built a business to meet customer requirements.


Enterprises Establish a 'Cybersecurity Cavalry'

As expert group gains status and budget, large organizations are moving away from the status quo.


Board-level Security Ratings Meets Threat Intelligence (BitSight Acquires AnubisNetworks)

Deal aligns cybersecurity business metrics with IT risk mitigation to bridge the perpetual communications gap between business executives and CISOs.


Yet another Proofpoint for Network and Endpoint Security Integration

Network/Endpoint integration initiatives gaining traction at advanced organizations driven by threat management and security analyst teams


Time to Embrace or Terminate National Cybersecurity Awareness Month

A waste of time and effort unless cybersecurity professionals and the industry beyond the Beltway jump on the Bandwagon.


Proofpoint Report Exposes Details about Cybercrime Division of Labor and Malware Architecture

Hacker tactics are varied, sophisticated, and built for success. This report should be required reading for everyone in the cybersecurity domain.


Leading Enterprise Organizations Have Established a Dedicated Network Security Group

Numerous market ramifications as network security moves away from the networking organization toward the infosec domain


Palo Alto Endpoint Security Announcement: Proof of a Market in Transition

Endpoint security tools moving beyond AV, putting a $10 billion market in play.


Load More