Making Sense of Raytheon and Websense

Potential to bring together deep cybersecurity expertise and commercial market execution.

04/23/15

Somber Message at RSA

Former cyber czar Richard Clarke reminds security leaders of the task at hand

04/22/15

RSA Conference Should Push For Technology Integration

Since cybersecurity software architecture has become an enterprise requirement, the RSA Conference should take a more proactive role in promoting technology integration

04/17/15

Threat Intelligence Sharing Momentum and Needs

Government and infosec industry should build upon threat intelligence energy by focusing on education, standards use-cases, and best practices

04/13/15

Anticipating RSA 2015

Focus on threat detection/response, endpoints, threat intelligence, IAM, cloud, and SDN

04/07/15

Could SDN Revolutionize Network Security?

Enterprise organizations identify attractive use cases where SDN-enabled network security can be used to improve threat detection/response, ease network security policy auditing, and centralize network security policy and...

04/02/15

The Cybersecurity Proportional Law (aka Oltsik's law)

As cybersecurity practices grow increasingly difficult for enterprise organizations, cyber-adversaries gain an offensive advantage.

03/31/15

In Cybersecurity, the Network Doesn’t Lie

Organizations are collecting, processing, and analyzing more and more network traffic.

03/26/15

Massive Enterprise Endpoint Security Opportunity

Next-generation endpoint security suite could be a billion dollar play

03/23/15

The Increasing Cybersecurity Attack Surface

New technology deployment opens cyber-threat vectors and makes security operations more complex

03/19/15

Information Security: The Most Important IT Initiative in 2015

Infosec bests data analytics, cloud, and mobile computing. What are the ramifications?

03/16/15

Will Public/Private Threat Intelligence Sharing Work?

Past examples point to a mixed record of success and failure.

03/12/15

Book Report: @War: The Rise of the Military-Internet Complex

Shane Harris's book outlines the good, bad, and ugly history of federal cybersecurity programs.

03/09/15

Endpoint Security Meets the Cybersecurity Skills Shortage

Many organizations don't have the resources in place to effectively prevent, detect, and respond to endpoint security events.

03/05/15

Challenges Associated with SSL/TLS traffic decryption and security inspection

Integration, organizational, performance, and technology problems abound

03/02/15

0% Cybersecurity Job Unemployment in Washington

A microcosm that demonstrates the consequences of the global cybersecurity skills shortage

02/26/15

The challenges of enterprise network encryption and security

Enterprises are decrypting traffic for security inspection, but it ain't easy.

02/24/15

Federal Cybersecurity Duplicity

President’s pep rally at Stanford repeated past promises and ignored the US conflict of interest between defensive reinforcement and offensive cyber operations

02/19/15

Enterprises Are Encrypting and Inspecting More Network Traffic

Large organizations recognize the benefits and vulnerabilities associated with greater use of SSL/TLS

02/17/15

Book Report: Countdown to Zero Day

Kim Zetter's book on Stuxnet sheds light on esoteric areas like malware analysis, process automation, and cyber war.

02/12/15

Load More