Annual hype-fest later this month will demonstrate which vendors “get it” and which are posers
There is no advanced persistent threat (APT) magic bullet solution but the New York Times breach should signal the need for information and endpoint security changes.
CIOs, CISOs need a mutually beneficial plan for big data security analytics – ASAP
Hacktivism and commonplace security attacks are on the increase. What does this mean?
New strategy is a good start but plenty of holes to fill and work to do in the future.
Undervalued TNC standard may be a perfect fit for knowledge-driven network security
Collecting massive amounts of security data is easy. Data analysis and visualization? Not so much.
Lots of malware and industry activity, but continuing intransigence in Washington.
A compelling and gripping story about a hacker’s background, mentality, skills, and criminal activities
Enterprises need to improve security intelligence, analytics, and automation to address skills deficits.
A few system and lifestyle changes will better protect you, your data, and your system in 2013.
Large organizations are under constant cyber attack by advanced malware that circumvents traditional security controls. In response, many CISOs have purchased new network or host-based advanced malware detection/prevention (AMD/P) tools for identifying and blocking malware. This is a good start, but what happens when advanced malware sneaks through security defenses and compromises servers and endpoints? ESG believes that large organizations need to support AMD/P gateways and endpoint software with security intelligence, file activity monitoring, and forensic data capture that work collectively as an AMD/P architecture.
Good news but CEO participation in cybersecurity decisions and oversight carries a cost
Antivirus is one of the most important features that business customers expect for secure file sharing. When IT decision-makers were asked about the most important security features they look for when choosing an online file sharing and collaboration (OFS) solution, more than half cited antivirus scans. Yet this is a feature that OFS providers frequently bypass in their messaging. This brief lists and ranks the security requirements business customers look for in an OFS solution, and suggests next steps for OFS providers.
ESG Research reveals best practices. Information security intelligence another driver for big data security analytics.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188