Cybersecurity

Observability, Security And Merakification Headline Cisco Live! 2022

I attended Cisco Live! on June 13-15 in sunny and hot Las Vegas, NV. It was great to finally return in person and spend time with Cisco executives and customers at the networking giant’s signature event. Now that many of the pandemic restrictions have been lifted, we live in a hybrid work world. Thus, it was not …

Observability, Security And Merakification Headline Cisco Live! 2022 Read More »

Security Insights From The Road: RSA Conference & Zscaler Zenith Live

I’m on the road again to paraphrase a line from that well-known song by Willie Nelson, my Austin, Texas, hometown hero. The pandemic did its best to cancel events and move others to virtual formats. As an industry analyst and an extrovert, virtual was not an adequate substitution. There is no doubt that video collaboration …

Security Insights From The Road: RSA Conference & Zscaler Zenith Live Read More »

Aura’s Intelligent Safety Platform Should Create A Safer Internet For Consumers

It has been just over a year since Aura launched its consumer security and identity theft protection service, and I do not think Aura could have come at any better of a time. More and more people assumed a digital presence, the digitization of businesses expanded at an incredible pace, and the number of cybercriminals …

Aura’s Intelligent Safety Platform Should Create A Safer Internet For Consumers Read More »

Can ZTNA Evolve Campus Network Security?

These are uncertain times. Inflation, supply chain pressures and the current geopolitical environment are forcing organizations of all sizes to re-examine their approach to planning, funding and deploying cybersecurity solutions. One result of the pandemic has been the rise of the “micro-branch,” created by enterprises to support their newly remote employees. The unprecedented levels of …

Can ZTNA Evolve Campus Network Security? Read More »

Hillstone Networks Expands Its Security Portfolio With CloudArmour

The cybersecurity space is big – really big. The current state of geopolitics has elevated security from top of mind to obsessive focus for every C-level executive at companies of all sizes and types around the globe.  The CISOs and security professionals charged with protecting environments don’t have it easy. In addition to the daily …

Hillstone Networks Expands Its Security Portfolio With CloudArmour Read More »

Current Geopolitics Are Raising The Need For New Cybersecurity Measures

It is tragic to witness what is happening in eastern Europe. The conflict is near my heart, given that a good friend recently fled Kyiv with his wife, but it also raises broader public awareness of nation-state cyber-attacks. These virtual assaults are nothing new. A report published by IBM Security X-Force (a very Marvel comics-sounding team!) noted …

Current Geopolitics Are Raising The Need For New Cybersecurity Measures Read More »

How CyberArk Manages Privileged Access

The enterprise cyber security landscape is both multi-layered and multi-vectored. Solutions and platforms have been designed and developed to protect the entire enterprise—from the perimeter to infrastructure to users—and all of the apps and data contained within. Any IT professional can attest to the complexity of enterprise cyber security, and any security-focused IT professional can …

How CyberArk Manages Privileged Access Read More »

Google Stresses Hybrid, Security, All-In Customers At Cloud Next ‘21

Two weeks ago was busy for us tech analysts, tech events from Google, Apple and Dell. First on the docket was Google Cloud Next—Google’s annual conference for its enterprise customers and developers, held virtually for the second year in a row. There were many announcements to sift through, but this year’s big headlines revolved around …

Google Stresses Hybrid, Security, All-In Customers At Cloud Next ‘21 Read More »

Living Security Aims To Deliver Human Security Risk Management

Cybersecurity is arguably one of the hottest technology sectors today. Venture capital funds invest millions of dollars into startups while most companies tout the benefits of zero trust and secure application access. What often gets lost in these conversations is that most of the fallout from phishing and ransomware attacks is a direct result from …

Living Security Aims To Deliver Human Security Risk Management Read More »

Aura Now Offering Digital Security Platform To Businesses As An Employee-First Solution

Aura is a security platform that I have been keeping a close eye on for the last couple of months. I have even been using it myself as it incrementally rolls out its full suite of security, financial fraud, and identity theft prevention products and services. You can read my overview of Aura’s offerings and how …

Aura Now Offering Digital Security Platform To Businesses As An Employee-First Solution Read More »

Three Companies To Watch In Cybersecurity

Cybersecurity is a hot topic these days on many fronts. Hacks related to SolarWinds, in an ironic twist, exposed FireEye, considered a perennial security provider. The Colonial Pipeline hack also raised significant concerns. As a result, the Biden administration issued an executive order in May and an additional memorandum in late July that aims to provide guidelines for addressing …

Three Companies To Watch In Cybersecurity Read More »

IBM Beefs Up Its Cyber-Resilient Storage

It’s an exciting time for those of us who work in the IT industry. It seems like that no matter where you look, you will find a disruptive technology or trend shaking things up. Some of these are good, others not so much.  Affordable high-speed 5G connectively extends our data centers to the edge while cloud …

IBM Beefs Up Its Cyber-Resilient Storage Read More »

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage for a total ransom of $70M. The cyberattack affected 800 and 1,500 organizations, disrupting IT functions for MSPs and their …

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape Read More »

Digging Deeper On HPE’s Latest Security Announcements

October kicks off National Cyber Security Month. In what seems to be an annual event, HPE made some security-related announcements that set the company up uniquely in the IT solutions provider market. What are those announcements, and what do they mean for IT organizations? I’ll unpack all of this and give my perspective in the …

Digging Deeper On HPE’s Latest Security Announcements Read More »

Attention CIOs: Stop Reacting And Start Being Proactive With Cybersecurity

Physical security and cybersecurity are intrinsically connected. Unfortunately, most organizations still treat these security functions as separate disciplines and processes. Until recently, separating the two was justified because the technology to integrate physical and cybersecurity was not available. However, this is changing with the emergence of IoT and advances in both sensors and integrated systems. …

Attention CIOs: Stop Reacting And Start Being Proactive With Cybersecurity Read More »

For DevOps, Application Programming Integration (API) Is A Major Security Vulnerability

One of the most often overlooked cybersecurity attack vectors, and one of the biggest threats is application-programming interface (API) security. According to the security giant, Akamai, over 80% of all Content Delivery Network (CDN) Internet traffic is API traffic.  APIs enable applications, services and micro services to work together. For example, organizations use APIs to …

For DevOps, Application Programming Integration (API) Is A Major Security Vulnerability Read More »

Cyberwarfare Requires Speed, Adaptability And Visibility To Win

Cybersecurity is now a war of attrition. Companies face new threats every day, and it is impossible to keep up with the frequency and volume of vulnerabilities that profoundly impact a company’s IT hygiene. Bad actors and nation-states have created a cottage industry for hackers/crackers who indiscriminately attack foreign networks and their critical infrastructure. Recently, …

Cyberwarfare Requires Speed, Adaptability And Visibility To Win Read More »

When It Comes To Cybersecurity, Covid-19 Tells Us We Do Not Deserve Nice Things

Over the past few months, Covid-19 has uncovered many security challenges within most enterprises’ cybersecurity programs. That said, most organizations were ill-equipped to detect and respond to cyber threats brought on by Covid-19, especially with a majority of the population working from home. This pandemic exposed many vulnerabilities from a political, societal, economic and critical …

When It Comes To Cybersecurity, Covid-19 Tells Us We Do Not Deserve Nice Things Read More »

VMware Security- One Of The Best Kept IT Secrets

I recently got the chance to attend an analyst briefing held by VMware senior executives, where I learned a lot about the company’s overall strategy and progress. This is a big time for VMware, and the tech industry in general, with more people working remotely than ever before in order to minimize the spread of …

VMware Security- One Of The Best Kept IT Secrets Read More »

COVID-19: The Monster That Made Security The Priority

If there is something positive to come out of COVID-19, it might be a new awareness of how unprepared the world is for this type of enemy. Additionally, it is demonstrating how dependent many nations have become on other countries to provide manufacturing, fabrication and supply chain services for critical infrastructure components. We will recover, …

COVID-19: The Monster That Made Security The Priority Read More »