DTW18 & Connecting The DoTs (Part 3 of 3)

LAS VEGAS: Of all the leading IT vendors, Dell has done the best job of ‘keeping it simple’, and ruthlessly embracing that mantra in everything it does, and the product launches at last week’s Dell Technologies World 2018 were no exception. Given its major brands — Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream, and VMware — and leadership in 22 product categories, the opportunity was there to release a flood of...

Read More

Note to…: Time For a Serious Dialogue About Cybersecurity

Like everyone else in the cybersecurity domain, I’ve been pretty busy the past week or so.  First there was the UPS store breach, which was small change compared to the nefarious cybersecurity situation at JP Morgan Chase.  The condition became a bit more whimsical when photos of naked celebrities floated around the web but quickly became serious again with the breach at Home Depot, which may trump the Target breach when all is said...

Read More

Big Data Security Analytics Can Become the Nexus of…

In a recent ESG research survey, security professionals working at enterprise organizations (i.e., more than 1,000 employees) were asked the following question: How do you believe that your organization will change its security technology strategy decisions in any of the following ways over the next 24 months in order to improve its security management? In response: 44% said that they planned to “design and build a more integrated...

Read More

Enterprises Need Outside-In Continuous Monitoring for…

Ask any CISO what their job entails and they are likely to respond with a common mantra:  Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk. In the past, CISOs concentrated this effort on internal IT but this internal focus is becoming increasingly myopic because: To read the complete article, CLICK...

Read More

The New Cybersecurity Technology Reality – the Whole Is…

I wrote a blog last week about new integrated anti-malware technology in response to Palo Alto Network’s acquisition of Cyvera. In fact, this integrated technology model isn’t limited to anti-malware but is becoming the new reality across the cybersecurity lifecycle of risk management, incident prevention, incident detection, and incident response. I’m convinced that this is where the market is headed, driven by burgeoning...

Read More