CA’s BTCS2.1: Where Do We GrOw From Here?
Jun14

CA’s BTCS2.1: Where Do We GrOw From Here?

At last week’s second annual Built to Change Summit CA Technologies updated analysts and journalists on where it and the markets it’s pursuing — primarily DevSecOps, with a heaping helping of mainframe — are, where they’re going, and how the software toolmaker will grab a bigger slice of the rapidly growing digital transformation (DT) pie, which is being largely driven by software, and more specifically, applications....

Read More

Cisco Security Synopsis from CiscoLive

Cisco held its annual customer event this week in Orlando FLA and invited the industry analysts to attend. CEO Chuck Robbins highlighted the company’s commitment to security in his CiscoLive keynote while other executives elaborated on more security product and services details. After a few days of meetings, I believe Cisco’s cybersecurity strategy focuses on: Product integration. Cisco wants a common cybersecurity product...

Read More

Talking Cloud Cybersecurity…

In this discussion, part of ESG’s ongoing 360 Video Series, Doug Cahill talks about not just the intricacies of cloud security – both of applications for Saas models and of infrastructure for IaaS – but also the opportunities that doing cloud security well can afford a business. It’s not simply a matter of ever more “padlocks on doors” but rather is a matter of making cloud security part of an integrated process; this is...

Read More

…Network Security Policy Management for Hybrid Clouds

As organizations embraced the public cloud over the past few years, security teams were on the hook to modify network security policies and implement security controls to protect cloud-based workloads. The goal was simple: Protect cloud-based workloads with network security polices and controls that were equal to or better than existing safeguards for physical and virtual servers in corporate data centers. This turned out to be far...

Read More

Analyst-centric Security Operations

Let’s face it, cybersecurity is a geeky domain. While much of IT has shifted its focus to things like business processes enablement and digital transformation, infosec pros still spend much of their waking hours in the weeds, looking at things like protocol anomalies, SQL statements, command shells, etc. This technical purview has been a highlight of security operations products since their inception. In the early days (late 1990s),...

Read More