Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • July 30, 2015

    Black Hat Is About Cybersecurity People and Processes

    Over the past few years, the RSA Security Conference has become a marquee technology industry event. It has really outgrown its humble roots in cryptography and Layer 3 and 4 packet filtering – now RSA is where technology industry bigwigs meet, drink exquisite Napa Valley wine, get a broad perspective of the cybersecurity industry, and do deals.

    Learn More


  • July 30, 2015

    An End to "End to End" Big Data Solutions?

    Some people like putting together jigsaw puzzles, and some people like buying paintings. Both approaches are pretty popular in the world of big data, though perhaps the nature of analytics in business tends to skew things heavily toward the "some assembly required" side of the spectrum. This is not a trivial problem, but it's a problem that does need to be solved. Connecting data sources, preparing data, developing analytical models, sharing findings...in any normal workflow, there are a number of steps to be taken, and a much larger number of technologies that will come into play.

    Learn More


  • July 28, 2015

    Cybersecurity Technology Integration Changes Everything

    I have been writing about cybersecurity technology integration a lot lately. For example, here’s a blog I posted in May of this year about the cybersecurity technology integration trends I see in the market.

    Learn More


  • July 27, 2015

    Workspaces and Identity Management

    The user should be at the nucleolus of a mobility strategy. In the past, we have really managed everything from a device perspective, but with the onslaught of businesses embracing mobility to enhance their employee productivity, the swing toward putting the user at the center of the workspace is upon us.

    Learn More


  • July 24, 2015

    Will Googles’ Kubernetes become the GodFather of OpenStack Cloud Container Management?

    Google’s recent announcement to become a sponsor of the OpenStack foundation was a virtual coup for the open source community. With the likes of traditional technology vendors like IBM, HP, Cisco, EMC, Red Hat and others already onboard the OpenStack bandwagon, adding Google to this prestigious mix nicely rounds out the foundation’s “Who’s Who” of technology luminaries.

    Learn More


  • July 24, 2015

    Cybersecurity Canon and The Florentine Deception

    I first met cybersecurity veteran, Rick Howard, when he joined Palo Alto Networks as Chief Security Officer. During our discussion, Rick mentioned an idea he was promoting for a cybersecurity canon: A list of must-read books for all cybersecurity practitioners -- be they from industry, government, or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and that, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.

    Learn More


  • July 23, 2015

    Microsoft & Adallom: Turning up the Cloud Security Volume

    It has been a few days now since word got out that Microsoft signed a letter of intent to acquire Adallom. Since we apparently do not yet have a definitive agreement in place, we have not heard from either party on the synergies and points of leverage this acquisition provides, some of which are obvious, others more nuanced. In any case, this news highlights some fundamental dynamics for how this emerging and highly relevant security product category will develop.

    Learn More


  • July 22, 2015

    Measuring the Quality of Commercial Threat Intelligence

    In my most recent blog, I described how a recently published ESG research report on threat intelligence revealed a number of issues around commercial threat intelligence quality.

    Learn More


  • July 22, 2015

    What’s a Workspace?

    We are all aware of the PC era when desktop computing made massive waves inside businesses and truly transformed the way employees worked. Today, we are headed into a very similar situation with mobility as it relates to new devices, new roles, and an interesting balance between corporate and personal computing. The days of being tethered to a desktop or laptop are rapidly changing. Heightened awareness concerning security, the many threat vectors being injected into every instantiation of the corporate computing environment, and the opportunities to unleash the potential inside smartphones and tablets are fascinating subjects.

    Learn More


  • July 22, 2015

    Looking Forward to OpenDaylight Summit

    OpenDaylight (ODL) Summit is coming up on July 27th. There are many tutorials for users and app developers, as they had in the past. ODL is an open source SDN (software defined network) and NFV (network functions virtualization) platform project that requires collaboration from different members to design, implement, and test systems, so the process of creating this software as a community is critical. Of course, it’s interesting to hear stories of end-users deploying this software and of vendors basing their products on the platform.

    Learn More



More Results: