What I Learned at the Tufin Customer Conference (Tufinnovate)

Last week, I attended Tufin’s annual customer conference, Tufinnovate, here in Boston. If you don’t know Tufin, the company focuses on network security policy management for enterprise organizations.

Topics: Network Security Cybersecurity cloud security

Toward Central Network Security Policy Management for Hybrid Clouds

As organizations embraced the public cloud over the past few years, security teams were on the hook to modify network security policies and implement security controls to protect cloud-based workloads. The goal was simple: Protect cloud-based workloads with network security polices and controls that were equal to or better than existing safeguards for physical and virtual servers in corporate data centers.

Topics: Network Security Cybersecurity cloud security

Containers are Here! What About Container Security?

The industry is gaga for container technologies like Docker and for good reason. According to ESG research, containers make up about 19% of hybrid cloud production workloads today, but in just 2 years’ time, containers will make up one-third of hybrid cloud production workloads. 

Not surprisingly, rapid growth and proliferation of application containers have led to several security issues:

Topics: Cybersecurity cloud security containers docker

Cloud Computing Security Chaos Continues at RSA Conference 2018

My esteemed colleague, Doug Cahill, did a great job at the RSA Conference with a killer presentation on hybrid cloud security. Unfortunately, Doug’s presentation occurred on Thursday afternoon, when many conference attendees were catching flights home, packing up their booths, or recovering at a bar somewhere else in San Francisco. Despite the timing, about 150 souls showed up, but I’m guessing that Doug’s conference room would have been overflowing if his presentation was on Tuesday rather than Thursday.

Topics: Cybersecurity RSA Security Conference cloud security

What is a Cybersecurity Technology Platform Anyway?

At last week’s RSA Conference, you couldn’t walk more than 10 feet on the show floor without a security vendor pitching you on its technology “platform.” Yup, Check Point, Cisco, FireEye, Forcepoint, Fortinet, McAfee, Palo Alto Networks, Symantec, Trend Micro, Webroot, and lots of others are now busy pitching platforms and will continue to do so. 

Okay, but what is the actual definition of this term? In general, vendors use the word “platform” to describe an integrated amalgamation of point products that creates a common and interoperable architecture. It’s safe to say that all vendors agree upon this platform characteristic. Beyond this basic functionality, however, there doesn’t seem to be much consensus on security technology platform requirements.

Topics: Network Security Cybersecurity endpoint security cloud security

Cloud Security Will (and Should) Dominate the RSA Conference

Just a few days left before this year’s RSA Conference in San Francisco and everything points to a crazy week at the Moscone Center. I’ve heard that around 50,000 people will attend and that the Moscone Center is a mess of construction right now, so just getting in and out of the buildings may be difficult. 

Now, I’ve written a lot lately about my outlook for RSA as I expect a lot of banter around endpoint security, machine learning, security operations automation and orchestration, threat intelligence, risk management, etc. Yup, there will be a smorgasbord of topics throughout the week, but cloud security will dominate this year’s RSA Conference.

Topics: Cybersecurity cloud security

A Few Cybersecurity Predictions for 2018

Over the past few weeks, dozens of people have reached out to me with their cybersecurity predictions for 2018. Some prophecies are fairly obvious (ransomware will continue in 2018) while at the other extreme, some people are pushing doomsday forecasts aimed at garnering press hits (i.e., the US will suffer a cyber-attack in 2018 that knocks out the power grid for a substantial amount of time).

Topics: Cybersecurity SIEM cloud security machine learning SOAPA GDPR

Acute Cybersecurity Skills Shortage Areas

In my last blog, I reviewed some new research from ESG and the Information Systems Security Association (ISSA), revealing that 70% of cybersecurity pros say that the global cybersecurity skills shortage has impacted their organizations. Based upon this and other similar research, I’m convinced that the cybersecurity skills shortage represents an existential risk to our data, businesses, and national security.

Topics: Cybersecurity security analytics security operations cloud security ISSA

What’s Holding Back Enterprise Security Technology Transformation?

Last week, I wrote a blog about the rapid cycle of innovation happening with security technologies today – I’ve never experienced a time when every element of the security stack is transforming.

New security technologies are arriving at an opportune time. According to ESG research, 69% have increased their cybersecurity budgets in 2017 and my guess is that they will continue to increase investment in 2018. And when asked which BUSINESS initiatives will drive the most IT spending, 39% of organizations responded, “increasing cybersecurity protection.” This means that business executives are buying into the need for cybersecurity improvements all around. 

Topics: Network Security Cybersecurity SIEM CISO cloud security ISSA

Phased Process for Cloud Security

My colleague Doug Cahill and I have been following the development of cloud security for the past few years. What we’ve noticed is that many organizations tend to track through a pattern of actions as their organization embraces public cloud computing. The sequence goes through the following order:

  1. The pushback phase. During this period, CISOs resist cloud computing, claiming that workloads won’t be adequately protected in the public cloud. This behavior may still occur for late-comers or very conservative firms but the cloud computing ship has definitely sailed at most large enterprises. In other words, CISOs aren’t given an out clause--rather, they must figure out how to secure cloud-based workloads whether they like it or not.
Topics: Network Security Cybersecurity cloud security