Cybersecurity & Networking

  • IMG_1004Dell Tech World kicked off in Vegas this week, capturing the attention of 15,000 attendees from over 122 different countries.

    The big announcements in the day one keynote were focused on Hybrid Cloud, the Microsoft Azure partnership, and unified workspace, but the underlying theme was clear. Dell Technologies is continuing to embrace its “Better Together” philosophy creating solutions from its family of companies. This is evidenced by its solutions that leverage technology from VMware, Dell EMC, SecureWorks etc., wrapped into a single bundle. (more…)

  • puzzleThreat detection and response is hard and getting harder. According to ESG research, 76% of cybersecurity professionals claim that threat detection and response is more difficult today than it was two years ago, so this situation may only get worse in the future.

    Why are threat detection and response processes and actions so challenging? One of the primary reasons is that many organizations approach threat detection and response through a maze of disconnected point tools. In fact, ESG research indicates that 66% of organizations agree that threat detection/response effectiveness is limited because it is based upon multiple independent point tools. (more…)

  • sharing_in_businessAccording to ESG research, 82% of cybersecurity professionals agree that improving threat detection and response (i.e., mean-time to detect (MTTD), mean-time to respond (MTTR), etc.) is a high priority at their organizations. Furthermore, 77% of cybersecurity professionals surveyed say that business managers are pressuring the cybersecurity team to improve threat detection and response.

    (more…)

  • Risk Management Services

    Risk management services have existed for a long time but have traditionally focused more on business risk generally than security risk specifically. As corporate directors, boards, and executives see more damage done from cyber-attacks, the risk conversation has escalated. But performing cyber risk assessments is hard given architectural complexities, the migration to cloud, and the ever-advancing adversary.

    (more…)

  • anil engage19NetScout recently held its Customer Event: Engage19 in Nashville TN. Situated in the Opryland hotel (now called the Gaylord Opryland), there were approximately 800 attendees from over 350 companies coming to hear about the latest from NETSCOUT, meet with key executives, and learn from technical experts.

    (more…)

  • SOAPA Video with Devo (Part 2)

    In part 2 of my SOAPA video with old friend Dimitri Vlachos from Devo, we discuss:

    1. Devo use cases. Dimitri describes some of the most popular security use cases for Devo, including threat detection, security analytics/investigations, and threat hunting. I’ve got to hand it to Dimitri as he came up with one of the best SOAPA video soundbites ever, “You can’t use old tools to cover new security analytics needs.” (more…)
  • The Threat Detection and Response Landscape

    ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

    This Master Survey Results presentation focuses on the current people, process, and technology approaches to threat detection and response, specifically in the areas of endpoint detection and response, network traffic analysis, and managed detection and response.

    (more…)

  • Last week Intel hosted a group of press and analysts to learn about its Data Centric Innovation launch. Driven by the proliferation of cloud computing, growth in AI and analytics, and the cloudification of the network and the edge, Intel released a number of new technologies to help organizations process, store, and move all the data that is being created.  

    (more…)

  • endpoint-securityIn 2017, my colleague Doug Cahill conducted research on endpoint security. Back then, the research indicated that 87% of organizations were considering a comprehensive endpoint security suite rather than several disconnected endpoint security point tools.

    (more…)

  • atm19I spent a few days on the sunny Las Vegas strip with the team from Aruba last week at its annual customer event – Atmosphere 19. This year’s attendance recorded almost two thousand attendees and eight hundred partners. Aruba continues to grow and provided some stats to support that, citing over 1Billion switch ports, 15M access ports, 500,000 customers, 90,000 or so Airheads, and over 4000 patents. HPE Aruba is now at three billion in revenues and looking towards future growth that would get them to five billion.

    (more…)

  • identityChinese military strategist Sun Tzu is quoted as saying, “if you know the enemy and you know yourself, you need not fear the results of a hundred battles.” In cybersecurity terms, this means knowing the cyber-adversaries and associated tactics, techniques, and procedures (TTPs) they use to attack your organization. Additionally, Sun Tzu’s quote extends to an organizational reflection where you must know everything about your technical, human, and even physical vulnerabilities in order to apply the best protection for critical assets.

    (more…)

  • SOAPA Video with Devo (Part 1)

    Whip it good–as old friend Dimitri Vlachos from Devo stopped by the ESG video studio to kick off our 2019 SOAPA video series. If you are unfamiliar with Devo, the company describes itself as follows:

    Devo delivers real-time operational and business insights from analytics on streaming and historical data to operations, IT, security, and business teams at the world’s largest organizations. (more…)