Opinion

White House Cybersecurity Coordinator Is Kind of Right – but Mostly Wrong

Cybersecurity progress in Washington depends upon the right policies and programs based upon the right technical details...

08/28/14

Opinion

Security pros speak out on SDN uses for network security

Large organizations see SDN and network security working together for malware blocking/detection, network auditing, and improving network management....

08/25/14

Opinion

Virtual Security Remains Anathema to Many Organizations

VMworld hype masks the fact that many enterprises remain wedded to security appliances and are only “toe-dipping” with virtual security appliances....

08/22/14

Opinion

Figuring out FIDO (i.e. the Fast IDentity Online alliance and standard)

Great potential but too much hype and confusion are getting in the way...

08/18/14

Opinion

Enterprise Organizations Need Formal Incident Response Programs

PCI and other regulations will drive this behavior, but CIOs/CISOs need to build an incident response program with the same focus, discipline, and rigor as BC/DR...

08/13/14

Opinion

My Final Impressions of Black Hat 2014

High energy, strong community, scary cybersecurity situation...

08/11/14

Opinion

Cloud Security Priorities and Synergies with Enterprise Security

CISOs must prioritize identity, data security, and security monitoring, and strive for a “single-pane-of-glass” across enterprise IT, SaaS, PaaS, and IaaS...

08/04/14

Opinion

Anticipating Black Hat 2014

Cybersecurity event brings together an army of infosec nerds with a focus on threats, vulnerabilities, and innovative defenses....

08/01/14

Opinion

Cybersecurity Startup Gold Rush for Venture Capitalists

Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security...

07/30/14

Opinion

BYOA: Bring Your Own Authentication

Enterprises should prepare for, and take advantage of, the consumerization of authentication technology...

07/28/14

Opinion

Big data security analytics 'plumbing'

Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN and middleware....

07/18/14

Opinion

Threat intelligence lifecycle maturation in the enterprise market

A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy....

07/15/14

The CISO-centric Information Security Triad
Opinion

The CISO-centric Information Security Triad

CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition....

07/10/14

Board of directors will have a profound impact on cybersecurity
Opinion

Board of directors will have a profound impact on cybersecurity

High demand will drive new intelligence, services, tools and executive cybersecurity skill sets....

07/07/14

Big data security analytics mantra: Collect and analyze everything
Opinion

Big data security analytics mantra: Collect and analyze everything

Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change....

07/01/14

End users must be part of cybersecurity solutions
Opinion

End users must be part of cybersecurity solutions

It’s time to stop blaming employees and enlist their help....

06/24/14

Endpoint security demands organizational changes
Opinion

Endpoint security demands organizational changes

Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas....

06/20/14

Opinion

The two cornerstones of next-generation cybersecurity (Part 2)

Strong data security must be aligned with identity knowledge and enhancements....

06/17/14

Opinion

The two cornerstones of next-generation cybersecurity (Part 1)

Applications, endpoints, networks, and servers will enforce security policies related to identity and data security....

06/13/14

Opinion

Big data security analytics can become the nexus of information security integration

Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response....

06/10/14

Load More