Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Application Development & Deployment Truths||The Bigger Truth||Insecure About Security|
|Cloud Computing Truths||Big Data, the Universe, and Everything||IT Artillery|
|Data Management & Analytics Truths||The Business of Storage||IT Depends|
|Data Protection Truths||Channeling IT||Liquefying IT|
|Information Security Truths||Decoding Development and Developers||Technical Optimist|
|Networking Truths||ESG Lab Blog|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
Over the past few years, the RSA Security Conference has become a marquee technology industry event. It has really outgrown its humble roots in cryptography and Layer 3 and 4 packet filtering – now RSA is where technology industry bigwigs meet, drink exquisite Napa Valley wine, get a broad perspective of the cybersecurity industry, and do deals.
Some people like putting together jigsaw puzzles, and some people like buying paintings. Both approaches are pretty popular in the world of big data, though perhaps the nature of analytics in business tends to skew things heavily toward the "some assembly required" side of the spectrum. This is not a trivial problem, but it's a problem that does need to be solved. Connecting data sources, preparing data, developing analytical models, sharing findings...in any normal workflow, there are a number of steps to be taken, and a much larger number of technologies that will come into play.
I have been writing about cybersecurity technology integration a lot lately. For example, here’s a blog I posted in May of this year about the cybersecurity technology integration trends I see in the market.
The user should be at the nucleolus of a mobility strategy. In the past, we have really managed everything from a device perspective, but with the onslaught of businesses embracing mobility to enhance their employee productivity, the swing toward putting the user at the center of the workspace is upon us.
Google’s recent announcement to become a sponsor of the OpenStack foundation was a virtual coup for the open source community. With the likes of traditional technology vendors like IBM, HP, Cisco, EMC, Red Hat and others already onboard the OpenStack bandwagon, adding Google to this prestigious mix nicely rounds out the foundation’s “Who’s Who” of technology luminaries.
I first met cybersecurity veteran, Rick Howard, when he joined Palo Alto Networks as Chief Security Officer. During our discussion, Rick mentioned an idea he was promoting for a cybersecurity canon: A list of must-read books for all cybersecurity practitioners -- be they from industry, government, or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and that, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
It has been a few days now since word got out that Microsoft signed a letter of intent to acquire Adallom. Since we apparently do not yet have a definitive agreement in place, we have not heard from either party on the synergies and points of leverage this acquisition provides, some of which are obvious, others more nuanced. In any case, this news highlights some fundamental dynamics for how this emerging and highly relevant security product category will develop.
In my most recent blog, I described how a recently published ESG research report on threat intelligence revealed a number of issues around commercial threat intelligence quality.
We are all aware of the PC era when desktop computing made massive waves inside businesses and truly transformed the way employees worked. Today, we are headed into a very similar situation with mobility as it relates to new devices, new roles, and an interesting balance between corporate and personal computing. The days of being tethered to a desktop or laptop are rapidly changing. Heightened awareness concerning security, the many threat vectors being injected into every instantiation of the corporate computing environment, and the opportunities to unleash the potential inside smartphones and tablets are fascinating subjects.
OpenDaylight (ODL) Summit is coming up on July 27th. There are many tutorials for users and app developers, as they had in the past. ODL is an open source SDN (software defined network) and NFV (network functions virtualization) platform project that requires collaboration from different members to design, implement, and test systems, so the process of creating this software as a community is critical. Of course, it’s interesting to hear stories of end-users deploying this software and of vendors basing their products on the platform.