Toward Omniscient Cybersecurity Systems

CISOs need an all-knowing central system to truly address their cybersecurity monitoring, diagnostics, and operations needs

05/19/15

Security Is a Prisoner of the Network

Cybersecurity professionals must gain experience and get comfortable with virtual network security

05/15/15

Google Network Security Sans Perimeter

Leading-edge network architecture called BeyondCorp is a sign of things to come

05/13/15

The Cloud Computing Security Challenge

Cloud computing's virtual, mobile, and on-demand nature is antithetical to existing security processes, skills, and technologies.

05/07/15

Valuable Federal Cybersecurity Training for Critical Infrastructure Organizations

Little known ICS-CERT program provides free cybersecurity training for infosec professionals and gets rave reviews

05/05/15

Federal Cybersecurity Carrots and Sticks

Critical infrastructure cybersecurity professionals want to see more government incentives and harsher penalties.

05/01/15

Cybersecurity, Critical Infrastructure, and the Federal Government

Security professionals working at critical infrastructure organizations are unclear about US government’s cybersecurity strategy and want to see more federal participation

04/29/15

Takeaways from RSA 2015: The stars of the show

Visibility, data center security, two-factor authentication, and services were the stars of the RSA 2015 conference last week in San Francisco.

04/27/15

Making Sense of Raytheon and Websense

Potential to bring together deep cybersecurity expertise and commercial market execution.

04/23/15

Somber Message at RSA

Former cyber czar Richard Clarke reminds security leaders of the task at hand

04/22/15

RSA Conference Should Push For Technology Integration

Since cybersecurity software architecture has become an enterprise requirement, the RSA Conference should take a more proactive role in promoting technology integration

04/17/15

Threat Intelligence Sharing Momentum and Needs

Government and infosec industry should build upon threat intelligence energy by focusing on education, standards use-cases, and best practices

04/13/15

Anticipating RSA 2015

Focus on threat detection/response, endpoints, threat intelligence, IAM, cloud, and SDN

04/07/15

Could SDN Revolutionize Network Security?

Enterprise organizations identify attractive use cases where SDN-enabled network security can be used to improve threat detection/response, ease network security policy auditing, and centralize network security policy and...

04/02/15

The Cybersecurity Proportional Law (aka Oltsik's law)

As cybersecurity practices grow increasingly difficult for enterprise organizations, cyber-adversaries gain an offensive advantage.

03/31/15

In Cybersecurity, the Network Doesn’t Lie

Organizations are collecting, processing, and analyzing more and more network traffic.

03/26/15

Massive Enterprise Endpoint Security Opportunity

Next-generation endpoint security suite could be a billion dollar play

03/23/15

The Increasing Cybersecurity Attack Surface

New technology deployment opens cyber-threat vectors and makes security operations more complex

03/19/15

Information Security: The Most Important IT Initiative in 2015

Infosec bests data analytics, cloud, and mobile computing. What are the ramifications?

03/16/15

Will Public/Private Threat Intelligence Sharing Work?

Past examples point to a mixed record of success and failure.

03/12/15

Load More