Most Recent Blogs

Hot Topics at the RSA Conference

Posted: February 20, 2014   /   By: Jon Oltsik   /   Tags: Cloud Computing, Check Point, Fortinet, Cisco, Networking, Information and Risk Management, FireEye, mobile, Security and Privacy, endpoint security, SIEM, Cybereason, Good Technology, bromium, 21CT, CloudPassage, Firewall, Cylance, click security, Bit9, Carbon Black, IDS/IPS, Firewall & UTM, Hexis Cyber Solutions, Public Cloud Service

It’s the calm before the storm and I’m not talking about the unusual winter weather. Just a few days before the 2014 RSA Security Conference at the Moscone Center in San Francisco.

In spite of this year’s controversy over the relationship between the NSA and RSA Security (the company), I expect a tremendous turnout that will likely shatter the attendance records of last year. Cybersecurity issues are just too big to ignore so there will likely be a fair number of first-time attendees.

Read More

Security Professionals Identify IT Risks Associated with Cloud Computing

Posted: January 28, 2014   /   By: Jon Oltsik   /   Tags: Cloud Computing, Information and Risk Management, McAfee, Security and Privacy, Security, Amazon, trend micro, CloudPassage, Target, nsa, Edward Snowden, privacy, Octa, HyTrust

It’s highly likely that cloud security will be one of the hot topics at this year’s RSA Security Conference coming up in February. Yes, there will surely be a lot of rhetoric and hype, but this is a very important topic for our industry to discuss as cloud computing continues to gain momentum with enterprise organizations.

While information security is still the primary concern around cloud computing, enterprise organizations aren’t holding back on deployment, albeit with non-sensitive workloads for the most part.

Read More

Enterprise CISO Challenges In 2014

Posted: January 10, 2014   /   By: Jon Oltsik   /   Tags: IBM, Palo Alto Networks, Cisco, Information and Risk Management, FireEye, HP, Security and Privacy, Security, risk management, Centrify, Malwarebytes, LogRhythm, bromium, 21CT, Leidos, RSA, Invincea, Accenture, ISC8, Blue Coat, CloudPassage, click security, Bit9, CSC, Hexis, HyTrust

I’m sure lots of CISOs spent this week meeting with their teams, reviewing their 2013 performance, and solidifying plans for 2014. Good idea from my perspective. The CISOs I’ve spoken with recently know exactly what they have to do but aren’t nearly as certain about how to do it.

At a high level, here’s what I’m hearing around CISO goals and the associated challenges ahead this year:

  1. Improve risk management. This translates into threat/vulnerability measurement, threat prevention, and ongoing communication with the business mucky mucks. The problem here is that their networks are constantly changing, scans are done on a scheduled rather than real-time basis, and the threat landscape is dangerous, sophisticated, and mysterious.
Read More

Posts by Topic

see all