Most Recent Blogs

Phased Process for Cloud Security

Posted: September 19, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, cloud security, micro-segmentation

cloud_security.jpgMy colleague Doug Cahill and I have been following the development of cloud security for the past few years. What we’ve noticed is that many organizations tend to track through a pattern of actions as their organization embraces public cloud computing. The sequence goes through the following order:

  1. The pushback phase. During this period, CISOs resist cloud computing, claiming that workloads won’t be adequately protected in the public cloud. This behavior may still occur for late-comers or very conservative firms but the cloud computing ship has definitely sailed at most large enterprises. In other words, CISOs aren’t given an out clause--rather, they must figure out how to secure cloud-based workloads whether they like it or not.
Read More

VMware Advances Application Security

Posted: August 30, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, VMware, VMworld, NSX, application security, AppDefense

GettyImages-482835783.jpgThis week at VMworld, VMware announced market availability of a new security technology called AppDefense. AppDefense is an application-layer security control designed to profile applications, determine “normal” behavior, and then provide a series of least privilege controls for applications and options for security incident remediation.

Now in some respects, AppDefense is a lot like application white listing/black listing, which can be very effective for limiting the attack surface but the historical problem with application controls is operational overhead. If you want to implement white listing, you have to know what workloads are running and whether they are allowed to, and then implement controls to restrict unanticipated application behavior. This can become quite cumbersome when servers run multiple applications with dynamic development cycles and changing behavior. 

Read More

Are Next-generation Firewalls Legacy Technology?

Posted: May 05, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, Firewall, SDP

software-firewall.jpgA few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm – everyone needed, or at least wanted, an NGFW at the perimeter or within the internal network.

Read More

Cybersecurity Skills Shortage Impact on Technology Innovation

Posted: April 25, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, ISSA, SOAPA, security operations and analytic platform

I continue to research and write about the ongoing global cybersecurity skills shortage. For example, ESG research indicates that 45% of organizations report a problematic shortage of cybersecurity skills today, more than any other area within IT.

Want more?  Here are a few tidbits from last year’s research project done in conjunction with the Information Systems Security Association (ISSA). In a survey of 437 cybersecurity professionals and ISSA members:

Read More

Cybersecurity Remains an Elusive Business Priority

Posted: April 18, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, endpoint security, CISO, cloud security, cyber insurance

cyber-exec.jpgI’ve been remiss by not blogging earlier this year about ESG’s annual IT spending intentions research. The year 2017 continues to follow a pattern—cybersecurity is a high business and IT priority for most organizations. 

Read More

The New McAfee

Posted: April 07, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, McAfee, endpoint security, SIEM, cloud security

Security_Shield.jpgI’ve worked with McAfee for a long time – from its independent days, during the Network Associates timeframe, through financial issues, back to McAfee and the go-go Dave DeWalt era, and finally as Intel Security. 

Read More

Micro-segmentation Projects Span Enterprise Organizations

Posted: April 03, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, SDN, nfv, micro-segmentation

Internet_Abstract.jpgMicro-segmentation is nothing new. We started talking about the concept a few years ago, with the onset of software-defined networking technologies like OpenFlow. More recently, micro-segmentation was most often associated with establishing trusted connections between cloud-based workloads.

Read More

RIP Raimund Genes, Trend Micro CTO

Posted: March 28, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, endpoint security, cybercrime

speaker.jpgI learned this past Saturday that my good friend and Trend Micro CTO, Raimund Genes, passed away suddenly last week. Raimund was only 54.

Read More

RSA 2017: Anticipating Network Security Chatter

Posted: February 02, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, rsa conference

network.jpgEarlier this week, I posted a blog about my expectations for endpoint security at the upcoming RSA Conference.  Similarly, here’s what I anticipate hearing about network security:

Read More

RSA Conference Topic: Endpoint Security

Posted: January 31, 2017   /   By: Jon Oltsik   /   Tags: Network Security, Cybersecurity, endpoint security

endpoint_security.jpgAs the calendar shifts from January to February, cybersecurity professionals are gearing up for the RSA Security Conference in a few short weeks. Remarkably, the management team is expecting more than 50,000 attendees this year! 

So, what can we expect from RSA 2017? Well, cybersecurity is being driven by dangerous threats, digital transformation, and the need for massive scalability. This means innovation and change in just about every aspect of cybersecurity technology so I plan on writing a few blogs about my expectations for the RSA Conference. I’ll start with this one about endpoint security.

To be clear, endpoint security should no longer be defined as antivirus software. No disrespect to tried-and-true AV, but endpoint security now spans a continuum that includes advanced prevention technologies, endpoint security controls, and advanced detection/response tools. My colleague Doug Cahill and I are currently tracking more than 50 endpoint security vendors, demonstrating just how much activity there is today.

Read More

Posts by Topic

see all