Anticipating VMworld

Anticipating VMworld

Cloud and virtualization event will reveal the state of a transition to virtual network security services.

08/27/15

Facebook’s Threat Intelligence Sharing Potential

Data management, scale, and algorithmic strengths may give Facebook an advantage in threat intelligence sharing

08/24/15

Incident Response: More Art than Science

Cybersecurity industry needs to establish best practices and open secure channels for incident response communications.

08/19/15

Enterprises are Analyzing Lots of Internal Cybersecurity Data

Enterprise organizations collect, process, and analyze a wide variety of cybersecurity data, and there is no end in sight.

08/13/15

Black Hat Boogie

My quick takes on an interesting, exhausting, and frightening week at Black Hat 2015 in Las Vegas

08/11/15

Black Hat Is About Cybersecurity People and Processes

Cybersecurity professionals attending Black Hat can gain in-depth knowledge about good guys, bad guys, and everyone in between

07/30/15

Cybersecurity Technology Integration Changes Everything

Based upon current and future cybersecurity technology integration trends, CISOs are adjusting budgets, organizations, skills, and vendor choices. Even industry analysts are impacted by cybersecurity technology integration.

07/28/15

Cybersecurity Canon and The Florentine Deception

Industry organization dedicated to reviewing and selecting books for cybersecurity education. Case in point, new novel from author Carey Nachenberg

07/24/15

Measuring the Quality of Commercial Threat Intelligence

One person’s quality is another person’s fluff so objective measurements will be difficult. Threat intelligence quality may ultimately be gauged through crowdsourcing and threat intelligence sharing.

07/22/15

Are There Differences Between Threat Intelligence Feeds?

Enterprise cybersecurity professionals find it difficult to judge the quality and efficacy of disparate open source and commercial threat intelligence. In the short term, this means more buying and selling.

07/17/15

Cybersecurity Lessons from W. Edwards Deming

Process problems are the biggest bottleneck to strong cybersecurity so CISOs must address these issues before layering on additional technology

07/14/15

Enterprise Objectives for Threat Intelligence Programs

CISOs are investing in threat intelligence programs to improve secure controls, automate security operations, and establish centralized threat intelligence services within their organizations.

07/09/15

Beware Cybersecurity Charlatanism

As cybersecurity intersects with big money, rhetoric, mudslinging, and fallacies will add further confusion to an already muddled market

07/07/15

Enterprise Threat Intelligence Programs are Immature

Work ahead to operationalize and share threat intelligence

07/01/15

Enterprises Need Advanced Incident Prevention

Responsive, automated, and fine-tuned incident prevention is more important than ever.

06/25/15

Malware? Cyber-crime? Call the ICOPs!

Integrated Cybersecurity Orchestration Platforms (ICOPs) have the potential to automate incident detection/response and streamline cybersecurity operations

06/22/15

Endpoint Security Technology Nirvana

Enterprise security professionals want a tightly-integrated, feature-rich endpoint security suite. What will this product look like?

06/18/15

Cybersecurity Industry Blame Game at RSA Conference

Contrary to tradeshow presentations, the industry has not failed cybersecurity professionals as many speakers insinuated

06/16/15

Grading Cisco Cybersecurity after CiscoLive

Company showcased its rich product portfolio and strong cybersecurity commitment at CiscoLive. Great start but plenty of work ahead.

06/12/15

Cisco Cybersecurity Renaissance and Opportunity

Networking leader has an opportunity to flex its infosec muscle and tout its vision and Cisco Live.

06/05/15

Load More