Opinion

Big data security analytics 'plumbing'

Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN and middleware.

07/18/14

Opinion

Threat intelligence lifecycle maturation in the enterprise market

A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.

07/15/14

The CISO-centric Information Security Triad
Opinion

The CISO-centric Information Security Triad

CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.

07/10/14

Board of directors will have a profound impact on cybersecurity
Opinion

Board of directors will have a profound impact on cybersecurity

High demand will drive new intelligence, services, tools and executive cybersecurity skill sets.

07/07/14

Big data security analytics mantra: Collect and analyze everything
Opinion

Big data security analytics mantra: Collect and analyze everything

Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.

07/01/14

End users must be part of cybersecurity solutions
Opinion

End users must be part of cybersecurity solutions

It’s time to stop blaming employees and enlist their help.

06/24/14

Endpoint security demands organizational changes
Opinion

Endpoint security demands organizational changes

Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.

06/20/14

Opinion

The two cornerstones of next-generation cybersecurity (Part 2)

Strong data security must be aligned with identity knowledge and enhancements.

06/17/14

Opinion

The two cornerstones of next-generation cybersecurity (Part 1)

Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.

06/13/14

Opinion

Big data security analytics can become the nexus of information security integration

Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.

06/10/14

Advanced prevention: Nothing new, just better
Opinion

Advanced prevention: Nothing new, just better

Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.

06/06/14

Enterprise security monitoring weaknesses telegraph lots of future cybersecurity opportunities

Enterprise security monitoring weaknesses telegraph lots of future cybersecurity opportunities

Large organizations need help monitoring user behavior activity, alternative endpoints, threat intelligence, and sensitive data.

06/04/14

Enterprise Organizations Are Taking Steps to Improve Cybersecurity Analytics

Last week, online retail giant eBay announced that it was hacked between February and March of this year with stolen login credentials of an eBay employee.  This gave the hackers access to the user records of 145 million users...

05/27/14

Is Cisco Back (as an enterprise security leader)?

It wasn't too long ago that Cisco was a dominant force in information security technology.  The company was a market leader in firewalls, IDS/IPS, and email security and was actively pushing products for endpoint security and SIEM as

05/22/14

Big Data Security Analytics Meets Identity and Access Management

While most enterprise organizations have SIEM installed, they now realize that these venerable security systems cannot address today's dangerous threat landscape alone.  As a result, many are adding network forensics and big data...

05/19/14

The Emerging Cybersecurity Software Architecture

It's been a busy week for the information security industry.  FireEye announced the acquisition of nPulse which adds network forensics to its advanced malware detection/response portfolio.  IBM chimed in with a new Threat Prevention...

05/08/14

Antivirus Software Is Not Quite Dead Yet

In a Wall Street Journal article published earlier this week, Symantec SVP Brian Dye, is quoted as saying that "antivirus is dead."  Dye goes on to proclaim that, "we (Symantec) don't think of antivirus as a moneymaker in any way." I

05/06/14

Enterprises Are Not Monitoring Access to Sensitive Data

If you want to make a cybersecurity professional uncomfortable, simply utter these two word:  'Data exfiltration.'  Why will this term garner an emotional response?  Because data exfiltration is a worst-case outcome of a cyber-attack

05/01/14

Microsoft’s Conundrum with XP and IE

When Microsoft officially cut off support for Windows XP on April 8th, 27% of the PC market was essentially left on its own to deal with new security vulnerabilities.  Just three weeks have passed and we've already reached a...

04/29/14

Enterprises Need Outside-In Continuous Monitoring for Risk Management

Ask any CISO what their job entails and they are likely to respond with a common mantra:  Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk. In the...

04/24/14

Load More