Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.


Crypto: Nominated to the Cybersecurity Canon

Crypto, Steven Levy’s classic about privacy technology pioneers, is recommended reading for all cybersecurity professionals and should be inducted into the Cybersecurity Canon.


Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.


Operationalizing threat intelligence

Four steps enterprises must take before they can integrate threat intelligence into their overall cybersecurity strategies


A FireEye chat with Kevin Mandia

FireEye focused on engineering innovation, threat intelligence utilization and security as a service rather than Wall Street capriciousness.


Federal cybersecurity boondoggle: The Software Assurance Marketplace (SWAMP)

The Software Assurance Marketplace is well-intended, but it suffers from a lack of relevant features, internal mismanagement and few actual users.


Quick take: Symantec buys Blue Coat

Blue Coat has a great management team and plenty of opportunity, but this deal comes with question marks.


Endpoint detection and response: What’s important?

Enterprise organizations demand that EDR products offer scalability, strong data management, flexible analytics and open integration.


Enterprises are investing in network security analytics

Dangerous threats and new requirements are persuading organizations to collect, process and analyze more and more network telemetry and threat intelligence.


Software-Defined Perimeter Essentials

SDP depends on well-thought-out policies, strong authentication, and diligent data collection and analysis


Are there workloads in the cloud that don’t belong there?

Enterprise organizations are willingly moving sensitive data, mission-critical applications and network-based business processes to the public cloud.


Identity and access management infrastructure is misaligned with security

CISOs need to overhaul their entire Identity and Access Management (IAM) infrastructure to include multi-factor authentication, consolidated identity repositories, and on-premise and cloud-based IAM technologies.


Cloud security: A mismatch for existing security processes and technology

Enterprises use, but often abandon, traditional security controls to protect cloud-based applications and workloads.


Next-generation endpoint security market bifurcation

The new endpoint security market will remain forked between advanced prevention and endpoint detection and response (EDR) products.


High-demand cybersecurity skill sets

Specialized cybersecurity skills around cloud computing represent the biggest gap.


Cybersecurity Plan for POTUS 45

The next president must fund cybersecurity education, encourage private sector investment and take the lead on improving multi-lateral international cooperation.


The rise of threat intelligence gateways

These network appliances automatically block known threats, mitigate risk and streamline security operations.


If I were the next CEO of Symantec – Redux

Challenges from 2014 remain. Symantec must emphasize services, acquire promising startups, establish a partner ecosystem, and streamline products and operations


Cybersecurity salary inflation—A red flag

A global cybersecurity skills shortage is creating a rapid spike in salaries, exacerbating an already critical issue.


AV software: “I’m not quite dead yet”

Many organizations continue to use and benefit from antivirus software, while others have yet to use all of its capabilities.


Load More