Featured Content from Jon Oltsik

ESG Research Report

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

ESG Research Report

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

ESG Brief

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

ESG Brief

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

ESG Infographic

[ESG Blog] Security Analytics and Operations at RSA

So far, I’ve written two blogs about my expectations for the upcoming RSA Security Conference next week. The first blog was about my outlook for endpoint security while the second focused on network security.

ESG Infographic

[ESG Blog] Security Analytics and Operations at RSA

So far, I’ve written two blogs about my expectations for the upcoming RSA Security Conference next week. The first blog was about my outlook for endpoint security while the second focused on network security.

ESG TechTruth

[ESG Blog] RSA 2017: Anticipating Network Security Chatter

Earlier this week, I posted a blog about my expectations for endpoint security at the upcoming RSA Conference. Similarly, here’s what I anticipate hearing about network security:

ESG TechTruth

[ESG Blog] RSA 2017: Anticipating Network Security Chatter

Earlier this week, I posted a blog about my expectations for endpoint security at the upcoming RSA Conference. Similarly, here’s what I anticipate hearing about network security:

Expectations for RSA 2017

 
networksasia.png

“IoT introduces an avalanche of new devices, network traffic, and protocols to the mix,” writes Jon Oltsik, senior principal analyst at The Enterprise Strategy Group. “The security team will need the right skills and tools to identify IoT devices, secure IoT data and traffic, and recognize the difference between legitimate and suspicious communications.”

Read the entire article at Networks Asia

Some of our clients: