The rise of threat intelligence gateways

These network appliances automatically block known threats, mitigate risk and streamline security operations.

05/02/16

If I were the next CEO of Symantec – Redux

Challenges from 2014 remain. Symantec must emphasize services, acquire promising startups, establish a partner ecosystem, and streamline products and operations

04/28/16

Cybersecurity salary inflation—A red flag

A global cybersecurity skills shortage is creating a rapid spike in salaries, exacerbating an already critical issue.

04/18/16

AV software: “I’m not quite dead yet”

Many organizations continue to use and benefit from antivirus software, while others have yet to use all of its capabilities.

04/14/16

Learning about SDP via Google BeyondCorp

Google’s software-defined perimeter (SDP) architecture can act as a model that enterprise organizations can emulate and enhance over time.

04/11/16

Cloud Security Challenges

Enterprises have problems provisioning security controls, monitoring cloud security status, and detecting anomalous network traffic in the cloud

04/07/16

Data and Identity: Two New Security Perimeters

Leading organizations are investing in new controls for sensitive data protection

04/04/16

Cybersecurity as a Business Issue

ESG research data demonstrates that improving cybersecurity is a business – not just an IT – priority. What does this mean for enterprise organizations?

03/24/16

The Endpoint Security Continuum (Part 2)

Advanced prevention will dominate and change the endpoint security market

03/22/16

Cybersecurity Skills Shortage Impact on Cloud Computing

CISOs must plan for expansive cloud growth AND a lack of cybersecurity professionals with cloud computing skills

03/18/16

An Abundance of Incident Response Bottlenecks

ESG research indicates that manual processes, skills shortages, and technology integration gaps make it extremely difficult to prioritize and respond to cybersecurity incidents in a timely manner

03/14/16

Before Moving on From RSA…

A few last thoughts I had while fighting through the crowds at the Moscone Center

03/10/16

Many Thoughts about RSA 2016

Security conference demonstrated the good, bad, and ugly about the cybersecurity industry

03/07/16

RSA Conference 2016: Day 1

Early discussions on IoT, cloud security, encryption, and industry consolidation

02/29/16

Cybersecurity Industry To-Do List for RSA Conference

Cybersecurity Industry To-Do List for RSA Conference

Industry must do more to decrease the attack surface, increase the productivity of cybersecurity professionals, and enhance overall protection without getting in the way of users

02/25/16

Anticipating the RSA Security Conference

Skills shortage, security automation, cloud security, data security, endpoint security and security analytics top my list of priorities

02/22/16

Apple vs. DOJ Doesn’t Really Matter

With commercial and open source encryption tools readily available, criminals can easily bypass backdoors and vendor workarounds

02/19/16

My Two Cents on CNAP (Cybersecurity National Action Plan)

President’s plan is commendable but lacks details, doesn’t go far enough, and needs to break free of the federal bureaucracy status quo

02/17/16

Henry Ford and Incident Response

Industrialists' ideas about manufacturing operations serve as a good analogue for enterprise CISOs looking to improve IR efficiency.

02/12/16

Heterogeneous Multi-Dimensional Cloud Security

Heterogeneous Multi-Dimensional Cloud Security

CISOs are scrambling to find the right security policies, processes, controls, and monitoring to keep up with enterprise deployments of a multitude of cloud technologies.

02/09/16

Load More