Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.

07/22/16

Crypto: Nominated to the Cybersecurity Canon

Crypto, Steven Levy’s classic about privacy technology pioneers, is recommended reading for all cybersecurity professionals and should be inducted into the Cybersecurity Canon.

07/19/16

Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.

07/14/16

Operationalizing threat intelligence

Four steps enterprises must take before they can integrate threat intelligence into their overall cybersecurity strategies

07/05/16

A FireEye chat with Kevin Mandia

FireEye focused on engineering innovation, threat intelligence utilization and security as a service rather than Wall Street capriciousness.

06/21/16

Federal cybersecurity boondoggle: The Software Assurance Marketplace (SWAMP)

The Software Assurance Marketplace is well-intended, but it suffers from a lack of relevant features, internal mismanagement and few actual users.

06/16/16

Quick take: Symantec buys Blue Coat

Blue Coat has a great management team and plenty of opportunity, but this deal comes with question marks.

06/13/16

Endpoint detection and response: What’s important?

Enterprise organizations demand that EDR products offer scalability, strong data management, flexible analytics and open integration.

06/09/16

Enterprises are investing in network security analytics

Dangerous threats and new requirements are persuading organizations to collect, process and analyze more and more network telemetry and threat intelligence.

06/03/16

Software-Defined Perimeter Essentials

SDP depends on well-thought-out policies, strong authentication, and diligent data collection and analysis

06/01/16

Are there workloads in the cloud that don’t belong there?

Enterprise organizations are willingly moving sensitive data, mission-critical applications and network-based business processes to the public cloud.

05/27/16

Identity and access management infrastructure is misaligned with security

CISOs need to overhaul their entire Identity and Access Management (IAM) infrastructure to include multi-factor authentication, consolidated identity repositories, and on-premise and cloud-based IAM technologies.

05/23/16

Cloud security: A mismatch for existing security processes and technology

Enterprises use, but often abandon, traditional security controls to protect cloud-based applications and workloads.

05/19/16

Next-generation endpoint security market bifurcation

The new endpoint security market will remain forked between advanced prevention and endpoint detection and response (EDR) products.

05/13/16

High-demand cybersecurity skill sets

Specialized cybersecurity skills around cloud computing represent the biggest gap.

05/10/16

Cybersecurity Plan for POTUS 45

The next president must fund cybersecurity education, encourage private sector investment and take the lead on improving multi-lateral international cooperation.

05/05/16

The rise of threat intelligence gateways

These network appliances automatically block known threats, mitigate risk and streamline security operations.

05/02/16

If I were the next CEO of Symantec – Redux

Challenges from 2014 remain. Symantec must emphasize services, acquire promising startups, establish a partner ecosystem, and streamline products and operations

04/28/16

Cybersecurity salary inflation—A red flag

A global cybersecurity skills shortage is creating a rapid spike in salaries, exacerbating an already critical issue.

04/18/16

AV software: “I’m not quite dead yet”

Many organizations continue to use and benefit from antivirus software, while others have yet to use all of its capabilities.

04/14/16

Load More