Threats, compliance, and legal requirements driving forensics into the mainstream.
ESG’s Market Landscape Report defines the information security analytics market and includes coverage of 21 vendors. Due to the rapidly changing nature of this emerging market, ESG is making the report available on a complimentary basis for a limited time.
IBM paper suggests changes are needed in cybersecurity education to address this silent problem.
Piecemeal approach won’t work – Federal government mobile computing planning provides a good example of what will.
NGFW bolsters McAfee “Security Connected” initiative and links network- and host-based security.
Advanced organizations are most likely to favor network information security over server security.
Hackers are rattling an assortment of web application windows and doors to find a way in.
Hackers growing more creative, attentive, and persistent.
Mobile computing presents an opportunity to get things right if CISOs approach it with the right strategy.
Next Week’s Open Network Summit may signal a new era in networking equipment.
Rapid innovation in product intelligence, data sharing, visualization, and useability will separate leaders from posers.
ESG sees big data information security analytics solutions evolving along a continuum.
Purchasing behavior and information security organization focus has broad market implications.
FireEye, Imperva, Palo Alto Networks and SilverTail success stories driving more interest in funding information security startups.
Good concept but questions remain about timing and vendor motivation on software-defined networking (SDN) and network security.
Technology and innovation got all the attention at RSA 2013 while information security service providers can’t keep up with demand.
FireEye, Palo Alto Networks, and new cybersecurity requirements were buzzing at RSA 2013.
The information security industry is improving but many don’t understand the principles of security or their customers.
The information security industry is trending in the right direction but more work lies ahead.
Visible cybersecurity issues provide an opportunity for vendors to demonstrate knowledge, comprehensive solutions, and leadership at RSA Security Conference 2013.