Trip Report, Splunk Conference 2017

This [last] week was Splunk’s annual user conference (.conf), which took place in Washington DC this year. Now Splunk.conf is different than lots of other user conferences, although it does remind me of some of the events I attended at the start of my career (dare I say DECWorld?). Many Splunk users are absolutely gaga over the product and the company. Splunk customers exchange use cases, give presentations, participate in panel discussions, and talk about the way they use Splunk today and their plans for the future. Heck, they will even open up about what features they’d like to see Splunk adopt in the future. To read the complete article, CLICK...

Read More

Microsoft Ignite Enterprise Mobility and Security Highlights

For enterprise IT shops that may have been dismissive of Microsoft as they plan and implement their mobility strategies, Ignite proved that it is time to pay attention. Let’s face it, Microsoft has had to play catch up, but this is the first time I have seen validation of enterprise customer success, business success, and technology innovation. Here are a few highlights I’m seeing here at the event. To read the complete article, CLICK...

Read More

Time to Embrace a Security Management Plane in the Cloud

There’s an old saying that change is the enemy of security. To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to the management of security technologies. Experienced cybersecurity professionals often opt to install management servers and software on their networks so that management and staff “owns” their technologies and can control everything they can. To read the complete article, CLICK...

Read More

Phased Process for Cloud Security

My colleague Doug Cahill and I have been following the development of cloud security for the past few years. What we’ve noticed is that many organizations tend to track through a pattern of actions as their organization embraces public cloud computing. The sequence goes through the following order: To read the complete article, CLICK...

Read More

Security Operations Spending and ROI

ESG recently surveyed 412 cybersecurity and IT professionals asking a number of questions about their organization’s security analytics and operations. Overall, security operations are quite difficult, many organizations complain about too many manual processes, too many disconnected point tools, and a real shortage of the right skills. These issues can lead to lengthy incident detection and response cycles or worse yet, damaging data breaches. Just ask Equifax. To read the complete article, CLICK...

Read More