Enterprise Organizations are Replacing Commercial Antivirus with Freeware

ESG research provides another indication that the endpoint security market is in a state of transition

01/26/15

Grading the President’s SOTU Cybersecurity Agenda

Mixed bag. The Feds need to do a lot more.

01/22/15

Information Security Tops the List of Business Initiatives Driving 2015 IT Spending

Damaging and costly security breaches make cybersecurity initiatives a critical business requirement

01/20/15

Endpoint Security Activities Buzzing at Enterprise Organizations

CISOs are assessing people, processes, and technologies to address endpoint security threats and vulnerabilities

01/12/15

New research indicates cybersecurity skills shortage will be a big problem in 2015

ESG research shows high demand for infosec professionals as many organizations have a “problematic shortage” in this area.

01/08/15

What Should the 114th Congress Do About Cybersecurity in 2015?

Bellicose rhetoric and intelligence sharing aren’t enough, the U.S. needs a comprehensive cybersecurity strategy ASAP

01/05/15

Last Minute Cybersecurity Predictions for 2015

My quick list of things to look for next year

12/24/14

Sony Baloney

Hack at Sony Pictures exposes other cybersecurity issues: ignorance, hype, and the lack of a national and International strategy.

12/19/14

NAC Renaissance

Mobile devices, cloud computing, and security concerns are driving increasing use of granular network access controls.

12/16/14

Cisco Acquires Neohapsis: A Sign of the Times

Security services firm can help Cisco support customers, capitalize on growing services opportunities, and pull product sales

12/11/14

Cybersecurity Skills Shortage Panic in 2015?

Global cybersecurity skills shortage and high demand could lead to high turnover and hyper wage inflation next year

12/09/14

CISOs Should Become Proactive and Influential in SDN Planning, Deployment, and Strategy

Networking team will take the lead but security professionals should participate and provide input

12/05/14

Cybersecurity Recommendation: Don't Poke the Bear

Sony hack may illustrate the downside of picking a fight with skilled cyber adversary

12/03/14

SDN Networking Followed by SDN Security

As SDN technology is deployed on production networks, CISOs should be well along the way with SDN security projects.

11/25/14

Confusion Persists around Cyber Threat Intelligence for Enterprise Organizations

Enterprises have specific questions but government and industry responses are nebulous at best.

11/20/14

Time to Address Basic Organizational Issues that Impact IT Security

CEO must deal with fundamental weaknesses related to IT organization and status quo behavior if they really want to improve their cybersecurity strategies

11/17/14

Book Report: Tubes: A Journey to the Center of the Internet

Worthwhile read for those who want to understand the where the Internet resides and what it looks like

11/11/14

Trend Micro for Enterprise Security

North American image of Trend as an AV vendor is inaccurate and a disservice to the company. Enterprise security professionals should know better.

11/07/14

Intel Security oppportunities and challenges

McAfee FOCUS event demonstrates that Intel Security is well positioned for enterprise cybersecurity leadership if it can communicate its strong portfolio, hold customers’ hands, and avoid distractions.

11/03/14

What IBM can learn from its own cybersecurity business

IBM’s fortunes in cybersecurity improved substantially when it abandoned its internally focused strategy and built a business to meet customer requirements.

10/28/14

Load More