Featured Content from Jon Oltsik

Webinar: Security Analytics and Operations: Problems and Solutions

Join a groundbreaking research-based discussion exploring the complexities and nuances of modern security analytics and operations on Wednesday, July 19th, 12:00PM ET with analysts Jon Oltsik and Doug Cahill

 Security Analytics and Operations: Problems and Solutions

 


 

ESG Brief

[ESG Blog] WannaCry Makes Me Want to Cry!

As I read about the WannaCry ransomware attack, my brain is racing with thoughts about the causes and effects of this global incident. Here’s my two cents:

ESG Brief

[ESG Blog] WannaCry Makes Me Want to Cry!

As I read about the WannaCry ransomware attack, my brain is racing with thoughts about the causes and effects of this global incident. Here’s my two cents:

ESG Research Report

[ESG Blog] Enterprise Security Technology Consolidation

Look around the cybersecurity infrastructure at any enterprise organization and here’s what you’ll see – dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned, it just happened. Over the past 15 years, bad guys developed new cyber-weapons to exploit IT vulnerabilities.  

ESG Research Report

[ESG Blog] Enterprise Security Technology Consolidation

Look around the cybersecurity infrastructure at any enterprise organization and here’s what you’ll see – dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned, it just happened. Over the past 15 years, bad guys developed new cyber-weapons to exploit IT vulnerabilities.  

ESG Infographic

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

ESG Infographic

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

ESG TechTruth

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

ESG TechTruth

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

SOAPA: An Interview with Marc van Zadelhoff, IBM General Manager of Security

networksasia.png

“IoT introduces an avalanche of new devices, network traffic, and protocols to the mix,” writes Jon Oltsik, senior principal analyst at The Enterprise Strategy Group. “The security team will need the right skills and tools to identify IoT devices, secure IoT data and traffic, and recognize the difference between legitimate and suspicious communications.”

Read the entire article at Networks Asia

Some of our clients: