The Mike Brown Era – and the Associated Pressure – Begins at Symantec

Wall Street and enterprise customers demand bold actions as soon as possible.

09/29/14

More Alarming Data on the Cybersecurity Skills Shortage

Network security skills and staffing continues to lag at enterprise organizations. Time to sound the alarm?

09/24/14

Cisco, FireEye Announcements: A Microcosm of the Enterprise Cybersecurity Market

Integration and services needed for cybersecurity efficacy and operations efficiency

09/21/14

Enterprise Annexation of Endpoint Security

Malware detection, prevention, and response activities are quickly bringing endpoint and network security together.

09/11/14

Book Report: Cyberstorm by Matthew Mather

Great read for those who want to understand what might happen as a result of a devastating cyber-attack on critical infrastructure

09/09/14

Note to Executives, Legislators, and Consumers: Time For a More Serious Dialogue About Cybersecurity

Wave of security breaches illustrates the need to step back before moving forward

09/05/14

Network Security Challenges in the Enterprise

Enterprise security professionals point to unknown IT initiatives, lack of network security cohesion, and overlapping controls and processes.

09/02/14

White House Cybersecurity Coordinator Is Kind of Right – but Mostly Wrong

Cybersecurity progress in Washington depends upon the right policies and programs based upon the right technical details

08/28/14

Security pros speak out on SDN uses for network security

Large organizations see SDN and network security working together for malware blocking/detection, network auditing, and improving network management.

08/25/14

Virtual Security Remains Anathema to Many Organizations

VMworld hype masks the fact that many enterprises remain wedded to security appliances and are only “toe-dipping” with virtual security appliances.

08/22/14

Figuring out FIDO (i.e. the Fast IDentity Online alliance and standard)

Great potential but too much hype and confusion are getting in the way

08/18/14

Enterprise Organizations Need Formal Incident Response Programs

PCI and other regulations will drive this behavior, but CIOs/CISOs need to build an incident response program with the same focus, discipline, and rigor as BC/DR

08/13/14

My Final Impressions of Black Hat 2014

High energy, strong community, scary cybersecurity situation

08/11/14

Cloud Security Priorities and Synergies with Enterprise Security

CISOs must prioritize identity, data security, and security monitoring, and strive for a “single-pane-of-glass” across enterprise IT, SaaS, PaaS, and IaaS

08/04/14

Anticipating Black Hat 2014

Cybersecurity event brings together an army of infosec nerds with a focus on threats, vulnerabilities, and innovative defenses.

08/01/14

Cybersecurity Startup Gold Rush for Venture Capitalists

Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security

07/30/14

BYOA: Bring Your Own Authentication

Enterprises should prepare for, and take advantage of, the consumerization of authentication technology

07/28/14

Big data security analytics 'plumbing'

Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN and middleware.

07/18/14

Threat intelligence lifecycle maturation in the enterprise market

A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.

07/15/14

The CISO-centric Information Security Triad

The CISO-centric Information Security Triad

CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.

07/10/14

Load More