Doug Cahill

Doug Cahill

Doug is a senior analyst covering cybersecurity at ESG, drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9, where he launched market leading products and forged strategic partnerships. Over the years, Doug has also served in product management, marketing, and business development roles for storage management, networking, and database vendors, and started his career in IT as a business analyst.
Doug has a B.A. from the University of Massachusetts, Amherst, and enjoys spending time in the northern New England mountains and lakes.

Recent Posts by Doug Cahill:

ESG Brief: The Role of Endpoint Detection and Response in Improving Endpoint Security Posture

Abstract:

As cyberthreats increase in frequency and complexity, it becomes more of a strategic imperative for businesses to strengthen their endpoint security postures. Many organizations do so by supplementing traditional antivirus (AV) products with layered preventative and endpoint detection and response (EDR) controls. The desired outcomes of employing additional controls are to improve both threat detection efficacy and the operational efficiency of managing endpoint security solutions and responding to incidents. To realize greater efficiencies, many organizations are adopting endpoint security-as-a-service (SECaaS) and managed endpoint security services to mitigate threats and close the cybersecurity talent gap.

Topics: Cybersecurity Security

ESG Research Report: The State of Cloud Security in the Enterprise

Abstract:

ESG conducted an in-depth survey of 303 IT and cybersecurity professionals with knowledge of or responsibility for cloud security policies, processes, or technologies at enterprise organizations (i.e., more than 1,000 employees) in North America. This research was intended to assess the current practices and challenges associated with cloud computing security. Furthermore, respondents were asked about future strategic plans intended to improve the efficacy and efficiency of cloud security.

Topics: Cybersecurity

ESG Brief: The Importance of Securing Cloud Application Data

Abstract:

The broad adoption of cloud applications, often driven by a line of business outside of the visibility and control of corporate IT, provides organizations with compelling business agility, but also puts corporate data assets at risk. Organizations need purposeful security controls that embrace and enable the use of such cloud apps while also securing cloud-resident data with a rich data loss prevention (DLP) policy lexicon.

Topics: Cybersecurity

ESG Brief: Shining a Light on Shadow IT

Abstract:

The consumerization of IT, fueled by knowledge worker mobility and the prevalence of cloud applications, has created the conditions for line-of-business owners and even individual employees to commission and use business applications not sanctioned by corporate IT groups, a phenomenon commonly referred to as shadow IT. Recent ESG research shows that nearly two-thirds of enterprise organizations are aware of at least a moderate amount of non-IT-sanctioned cloud application usage. This is a trend that ESG believes will continue to grow at a problematic rate.

Topics: Cybersecurity Enterprise Mobility

ESG Brief: CounterTack: Next-generation, Big Data Endpoint Security and Response

Abstract:

In today’s dynamic business environment, data breaches continue to occur at an alarming rate. Staying ahead of cybercriminals can be a seemingly endless, though essential, undertaking for already-stretched IT personnel. While there is no silver bullet for thwarting an increasing variety of cyber threats, including exploits and malware, organizations should be looking to add next-generation endpoint security controls, including endpoint detection and response (EDR) solutions (a combination of detection, analysis, and real-time response and remediation capabilities), to their arsenal. Companies need to augment traditional signature-based antivirus with endpoint detection and response solutions as a means of mitigating advanced and often targeted security threats. With a number of options on the market today, next-generation endpoint detection and response vendor CounterTack is offering solutions that address those endpoint security challenges throughout the cybersecurity attack lifecycle.

Topics: Cybersecurity Data Management