To Automate or Not to Automate (Incident Response): That…

The recently published Senate report on the Target breach exposed a dicey situation that is all too familiar to enterprise security professionals. As it turns out, Target implemented malware detection technology from FireEye, which happened to detect the now infamous POS memory scrapping code but the IT team was running FireEye in detection rather than prevention mode. This meant that Target had to take some manual action to remove...

Read More
Security 2014: Expect A Bad Situation To Get Worse
Dec16

Security 2014: Expect A Bad Situation To Get Worse

With the IT Trends & Analysis holiday break starting next week (December 23-January 3), I’m clearing out my mailbox, and trying to incorporate the various vendor 2014 predictions into this week’s stories, including today’s focus on security. One would expect doom and gloom forecasts from security vendors – and IT industry analysts – and you won’t be disappointed. Looks like CISOs can expect the Grinch for...

Read More

Big Data Security Analytics: Strong Opps, Some challenges

My friends on Wall Street and Sand Hill Road will likely place a number of bets on big data security analytics in 2014. Good strategy as this market category should get loads of hype and visibility while vendor sales managers build a very healthy sales pipelines by March. To read the complete article, CLICK...

Read More