Handicapping Enterprise Security Vendors

Huge opportunity for enterprise security leaders to become multi-billion dollar businesses over the next few years


Cybersecurity Lessons Learned from the 9/11 Commission Report

Organizations must move beyond misaligned goals, poor collaboration, and organizational intransigence that hamper cybersecurity efforts at enterprise organizations.


The State of Cyber Insurance

Immature market, land grab for customers, high premiums, little change in the short-term.


Cloud Computing And Network Security Challenges

ESG research points to problems with automation, visibility, skills, and staffing.


Cisco Acquires Lancope: Great Fit, Great Deal

Security analytics firm fits hand-in-glove with Cisco products, services, and cybersecurity strategy


IT Vendor Risk Management: Improving but Still Inadequate

Despite advances over the past five years, IT vendor risk management is still done haphazardly and relies on static paper-based audits.


The Return of AV Leaders?

Intel Security, Sophos, Symantec, Trend Micro, and Webroot have extended endpoint security products for advanced malware prevention, detection, and response.


Stop CISA!

Fundamentally flawed cybersecurity legislation will have a marginal impact of risk mitigation while further eroding privacy protection and U.S. credibility abroad.


Oracle M7 Enhances CPU-level Security

Encryption, memory integrity, and tight software integration aligns silicon with cybersecurity requirements


What Happens to RSA?

No details from Dell/EMC deal so speculations ensues


FireEye Myth and Reality

New products, services, and partners unveiled in Washington D.C. position FireEye as an enterprise cybersecurity vendor


A Call for Open Cybersecurity Middleware

Swisscom proposing a standard abstraction layer for integration and more rapid incident detection and response.


U.S. Critical Infrastructure Continue to Make Risky IT Bets

More than half of critical infrastructure organizations admit that they have insecure IT products and services deployed on their networks.


Happy Cybersecurity Awareness Month?

Well intended effort only calls attention to pervasive cybersecurity ignorance throughout society


U.S. Critical Infrastructure under Cyber-Attack

Majority of critical infrastructure organizations have experienced damaging and costly incidents over the past two years


My Take-Aways from Splunk .conf2015

User passion and a multitude of security use cases were on display in Las Vegas this week


Book Report: Future Crimes

In this extremely interesting book, author Marc Goodman elaborates on, "the cornucopia of technologies we are accepting into our lives may very well come back and bite us"


Cyber Supply Chain Security Is Increasingly Difficult for Critical Infrastructure Organizations

New IT initiatives, and increase in IT suppliers, and consolidation of IT and operational technology (OT) make cyber supply chain security increasingly cumbersome


The Network’s Role as a Security Sensor and Policy Enforcer

Networks can (and should) be used to improve risk management as well as incident prevention, detection, and response


Challenges around Operationalizing Threat Intelligence

Beyond the information, process and skills improvements needed for threat intelligence collection, processing, analysis, and sharing


Load More