Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.

09/22/16

SIEM market dynamics in play

Financial churn combined with new requirements are transforming the SIEM market for enterprise organizations.

09/20/16

The era of identity-based applications

Enterprise organizations must elevate identity management beyond IT operations and make it an essential component of business processes and security.

09/15/16

Cybersecurity Goes Private: McAfee and RSA

Good opportunities but challenges ahead for both companies

09/08/16

VMworld: My Cybersecurity-Centric Impressions

NSX security is gaining traction in the VMware installed based but the story remains confusing to cybersecurity professionals. VMware needs to bolster its NSX security go-to-market initiatives to scale to the next level

09/02/16

Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.

08/29/16

The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.

08/22/16

More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results

08/17/16

CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.

08/11/16

A few thoughts from Black Hat 2016

Threats, vulnerabilities and security complexity represent serious challenges for cybersecurity professionals.

08/08/16

Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.

07/28/16

Russian DNC hack – A cybersecurity microcosm

The Russian hack of the DNC a microcosm of cybersecurity at large. Many companies are as vulnerable as the organization and as underprepared to handle such attacks.

07/27/16

Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.

07/22/16

Crypto: Nominated to the Cybersecurity Canon

Crypto, Steven Levy’s classic about privacy technology pioneers, is recommended reading for all cybersecurity professionals and should be inducted into the Cybersecurity Canon.

07/19/16

Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.

07/14/16

Operationalizing threat intelligence

Four steps enterprises must take before they can integrate threat intelligence into their overall cybersecurity strategies

07/05/16

A FireEye chat with Kevin Mandia

FireEye focused on engineering innovation, threat intelligence utilization and security as a service rather than Wall Street capriciousness.

06/21/16

Federal cybersecurity boondoggle: The Software Assurance Marketplace (SWAMP)

The Software Assurance Marketplace is well-intended, but it suffers from a lack of relevant features, internal mismanagement and few actual users.

06/16/16

Quick take: Symantec buys Blue Coat

Blue Coat has a great management team and plenty of opportunity, but this deal comes with question marks.

06/13/16

Endpoint detection and response: What’s important?

Enterprise organizations demand that EDR products offer scalability, strong data management, flexible analytics and open integration.

06/09/16

Load More