What to expect at Black Hat: Security hype and reality

What to expect at Black Hat: Security hype and reality

Look for machine learning, automation, orchestration, integration and threat intelligence to dominate the Black Hat security conference.


Cybersecurity operations more difficult than it was 2 years ago

New ESG research finds more threats, more work and more alerts make it difficult for cybersecurity professionals to keep up.


The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy identity and a secure path to network services.


How Cisco is establishing itself as a cybersecurity leader

Cisco demonstrated its commitment to cybersecurity at its annual customer event. It's in a good position but has lots of work ahead.


Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.


WannaCry makes me want to cry!

Some random thoughts on the causes and ramifications of the WannaCry ransomware attack—the biggest cybersecurity incident in years


SIEM remains an enterprise security architecture requirement

Enterprise-class cybersecurity technology vendors must offer SIEM software, security analytics, and operations capabilities or have strong SIEM partners.


The rise of enterprise-class cybersecurity vendors

Cybersecurity professionals say enterprise-class cybersecurity vendors must offer industry experience, support for IT initiatives and a commitment to streamline security operations.


Are next-generation firewalls legacy technology?

While network firewalls continue to anchor security, requirements are changing and next-generation firewall (NGFW) functionality is migrating elsewhere.


The move toward enterprise security technology integration

Enterprises want best-of-breed security technology and integration. They'd buy from enterprise-class cybersecurity vendors—if they knew who they were.


Enterprise security technology consolidation

Large organizations are consolidating the number of security vendors they do business with and buying products built for integration.


Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage demands that new cybersecurity technologies must be built for ease of deployment, ease of use, and rapid ROI.


Cybersecurity skills shortage threatens the mid-market

Organizations with 100 to 999 employees remain understaffed and under-skilled in cybersecurity—and an easy mark for hackers.


Cybersecurity remains an elusive business priority

Most organizations are increasing cybersecurity spending and elevating cybersecurity issues to the board level but still struggle with the cybersecurity skills shortage.


SOAPA services opportunities abound

Similar to the rise of ERP in the 1990s, we are about to see a cybersecurity services boom around Security Operations and Analytics (SOAPA).


People, process and technology challenges with security operations

Large organizations need to focus on formalizing processes, implementing intelligent security technologies, training staff and modifying the organization.


The 'new' McAfee

Security veteran McAfee has ample opportunity to prosper again with the right investment and focus.


Micro-segmentation projects span enterprise organizations

Large organizations are dedicating security and IT resources to craft a micro-segmentation strategy for all workloads across internal networks and public clouds.


RIP Raimund Genes, Trend Micro CTO

Raimond Genes, Trend Micro CTO, cybersecurity visionary and an inspiration, is gone but not forgotten.


Organizations need strategic and proactive threat intelligence programs

Enterprise organizations must move beyond reactive and operational use cases and leverage threat intelligence more aggressively.


Load More