Corporate Partners

Top IT Security Bloggers

Network World - Networking Nuggets and Security Snippets
  • SDN Networking Followed by SDN Security

    Network World - Networking Nuggets and Security Snippets
    Earlier this year, ESG published a research report titled, Network Security Trends In the Era of Cloud and Mobile Computing (note: I am an ESG employee). As part of this report, ESG surveyed 321 security professionals working at enterprise organizations (i.e. more than 1,000 employees) about their networking and network security strategies. It turns out that SDN is front-and-center. When asked if their organizations were deploying or planning to deploy SDN technology, 22% said that SDN was already deployed to some extent, 39% were currently testing SDN technology, 23% were planning to deploy SDN within the next 24 months, and 12% had no plans but were interested in deploying SDN in the future.To read this article in full or to leave a comment, please click here
  • Confusion Persists around Cyber Threat Intelligence for Enterprise Organizations

    Network World - Networking Nuggets and Security Snippets
    Over the last few months, I’ve talked to a number of CISOs and security analytics professionals about threat intelligence, as I’m about to dig into this topic with some primary research. One of the things I’ve learned is that large enterprises are consuming lots of open source and commercial threat intelligence feeds. In some cases, these feeds are discrete services from vendors like iSight Partners, Norse, or Vorstack. Alternatively, they also purchase threat intelligence along with products from security vendors like Blue Coat, Check Point, Cisco, FireEye, Fortinet, IBM, McAfee, Palo Alto Networks, Symantec, Trend Micro, Webroot and a cast of a thousand others. To read this article in full or to leave a comment, please click here
  • Time to Address Basic Organizational Issues that Impact IT Security

    Network World - Networking Nuggets and Security Snippets
    In the past, cybersecurity was thought of as an IT problem where CISOs were given meager budgets and told to handle IT security with basic technical safeguards and a small staff of security administrators.  Fast forward to 2014 and things have certainly changed now that business mucky-mucks read about data breaches in the Wall Street Journal on a daily basis. CEOs and corporate boards are now struggling to understand cyber risk and gain greater oversight of infosec strategies.  They are also willingly increasing IT security budgets.  According to ESG research, 62% of organizations planned to increase information security spending in 2014 and it’s likely that even more will do so next year (note: I am an ESG employee).To read this article in full or to leave a comment, please click here
  • Book Report: Tubes: A Journey to the Center of the Internet

    Network World - Networking Nuggets and Security Snippets
    Okay, I admit that I’m a geek and have read numerous books on the history of IT and the Internet.  Katie Hafner’s, Where Wizards Stay up Late, The Origins of the Internet, is a particular favorite of mine. Along these lines, I just finished a book called, Tubes. A Journey to the Center of the Internet, by Andrew Blum, a Wired Magazine correspondent.  Now Tubes does provide a bit of Internet history around the Arpanet project, BBN, the Interface Message Processor (IMP), and the original Internet node at UCLA but it takes the story in a different direction.  Tubes goes on to look at the physical stuff like routers, cables, buildings, spinning disk drives, etc. – where they are, how they got there, who built them, and who manages them.To read this article in full or to leave a comment, please click here
  • Trend Micro for Enterprise Security

    Network World - Networking Nuggets and Security Snippets
    Ask a security professional in North America to describe Trend Micro and you will likely hear about antivirus software and a grouping of vendors that also includes McAfee and Symantec. Funny, but you’d get a completely different answer if you asked the same question in Brazil, Germany, or Japan. In these markets, you’d hear about a billion dollar-plus enterprise-class security leader with a full portfolio of products, partnerships, and managed services.Why the disconnect? Trend is an Asian company that hasn’t pushed too hard into the North American market until recently (other than the consumer sector). Furthermore, Trend isn’t known for guerilla marketing tactics, cybersecurity exposés, or expensive marketing campaigns at Black Hat and RSA. To read this article in full or to leave a comment, please click here
  • Intel Security oppportunities and challenges

    Network World - Networking Nuggets and Security Snippets
    With the glitz of Las Vegas as a background, Intel Security (aka McAfee) held its annual FOCUS event last week, attracting analysts, customers, and the press alike. Intel President, Renee James was first to take the stage and articulated a vision of “creating a baseline of security across hardware, software, and the cloud.” James was followed by Chris Young, who recently joined the company (from Cisco) as SVP and GM of Intel Security. Young built on his boss’s words by stating that IT complexity and fragmentation have become the enemy of security. He went on to describe how Intel Security was well-positioned to address these problems.These two executives (and a cast of other Intel Security executives) were certainly toeing the company line, but in my humble opinion Intel Security is one of few vendors that really do have the potential to help CISOs address ever-changing enterprise cybersecurity requirements. After all, Intel Security has:To read this article in full or to leave a comment, please click here
  • What IBM Can Learn from its own Cybersecurity Business

    Network World - Networking Nuggets and Security Snippets
    IBM’s recent financial results sent Wall Street into a tizzy as the company missed its targets on multiple counts.  Brooks Brothers-clad equity analysts quickly freaked out, declaring that IBM is too big, has lost its sense of innovation, and needs to be broken up a la HP. 
    I grew up close to Armonk NY so I’ve known IBM my whole life.  While I have some opinions about the IBM Corporation’s problems and what it should do, I’ll hold on that perspective for now.  As food for thought on IBM’s woes, here is an excellent article in Forbes magazine, written by industry veteran Robert Cringely. To read this article in full or to leave a comment, please click here
  • Enterprises Establish a 'Cybersecurity Cavalry'

    Network World - Networking Nuggets and Security Snippets
    In the past, enterprise cybersecurity responsibilities were tilted toward oversight rather than hands-on operations and technology procurement. Security analysts were counted on for incident detection and response, but aside from this function CISOs helped organizations develop and enforce the right policies. Meanwhile, functional IT groups selected, deployed, and operated security products. 
    Take network security for example. A few years ago, there was a pretty common division of labor – security professionals defined requirements and the networking team purchased and operated network security technologies like firewalls, proxy servers, and IDS/IPS. To read this article in full or to leave a comment, please click here
  • Board-level Security Ratings Meets Threat Intelligence (BitSight Acquires AnubisNetworks)

    Network World - Networking Nuggets and Security Snippets
    With the recent avalanche of security breaches including Target, Home Depot, and JP Morgan Chase, cybersecurity companies have become financial darlings from Wall Street to Sand Hill Rd. Investors on both coasts are looking for the next major IPO or acquisition to cash in on the dangerous threat landscape.Along those lines, there was an interesting cybersecurity acquisition announced this morning. Massachusetts-based BitSight, a cybersecurity rating service provider, acquired AnubisNetworks, a threat intelligence firm based in Portugal. Now, it’s likely that the technical analysts in lower Manhattan and the Chardonnay-drinking VCs in Palo Alto will overlook this low-dollar merger, but there is more here than money alone. The combination of BitSight and Anubis has the potential to unite alien populations – business and technology groups. To read this article in full or to leave a comment, please click here
  • Yet another Proofpoint for Network and Endpoint Security Integration

    Network World - Networking Nuggets and Security Snippets
    As I’ve mentioned many times in my blog, there is a lot of evidence suggesting a trend toward the amalgamation of endpoint and network security. Here’s another recent data point that supports this further.  ESG recently published a new research report titled, Network Security Trends in the Era of Cloud and Mobile Computing.  The report is based upon a survey of security professionals working at enterprise organizations (i.e. more than 1,000 employees).  ESG asked them: “Is your organization engaged in any type of project to integrate anti-malware and analytics technologies on networks and endpoints?”  Nearly one-quarter (22%) said, “yes, extensively,” while another 39% responded, “yes, somewhat” (Note: I am an ESG employee).To read this article in full or to leave a comment, please click here

Market Place