Making Sense of Raytheon and Websense

Potential to bring together deep cybersecurity expertise and commercial market execution.


Somber Message at RSA

Former cyber czar Richard Clarke reminds security leaders of the task at hand


RSA Conference Should Push For Technology Integration

Since cybersecurity software architecture has become an enterprise requirement, the RSA Conference should take a more proactive role in promoting technology integration


Threat Intelligence Sharing Momentum and Needs

Government and infosec industry should build upon threat intelligence energy by focusing on education, standards use-cases, and best practices


Anticipating RSA 2015

Focus on threat detection/response, endpoints, threat intelligence, IAM, cloud, and SDN


Could SDN Revolutionize Network Security?

Enterprise organizations identify attractive use cases where SDN-enabled network security can be used to improve threat detection/response, ease network security policy auditing, and centralize network security policy and...


The Cybersecurity Proportional Law (aka Oltsik's law)

As cybersecurity practices grow increasingly difficult for enterprise organizations, cyber-adversaries gain an offensive advantage.


In Cybersecurity, the Network Doesn’t Lie

Organizations are collecting, processing, and analyzing more and more network traffic.


Massive Enterprise Endpoint Security Opportunity

Next-generation endpoint security suite could be a billion dollar play


The Increasing Cybersecurity Attack Surface

New technology deployment opens cyber-threat vectors and makes security operations more complex


Information Security: The Most Important IT Initiative in 2015

Infosec bests data analytics, cloud, and mobile computing. What are the ramifications?


Will Public/Private Threat Intelligence Sharing Work?

Past examples point to a mixed record of success and failure.


Book Report: @War: The Rise of the Military-Internet Complex

Shane Harris's book outlines the good, bad, and ugly history of federal cybersecurity programs.


Endpoint Security Meets the Cybersecurity Skills Shortage

Many organizations don't have the resources in place to effectively prevent, detect, and respond to endpoint security events.


Challenges Associated with SSL/TLS traffic decryption and security inspection

Integration, organizational, performance, and technology problems abound


0% Cybersecurity Job Unemployment in Washington

A microcosm that demonstrates the consequences of the global cybersecurity skills shortage


The challenges of enterprise network encryption and security

Enterprises are decrypting traffic for security inspection, but it ain't easy.


Federal Cybersecurity Duplicity

President’s pep rally at Stanford repeated past promises and ignored the US conflict of interest between defensive reinforcement and offensive cyber operations


Enterprises Are Encrypting and Inspecting More Network Traffic

Large organizations recognize the benefits and vulnerabilities associated with greater use of SSL/TLS


Book Report: Countdown to Zero Day

Kim Zetter's book on Stuxnet sheds light on esoteric areas like malware analysis, process automation, and cyber war.


Load More