About Scott Crawford

This author has not yet filled in any details.
So far Scott Crawford has created 45 blog entries.

Security in 2013: Intelligence, Integration…and the Integration of Intelligence


In my last post, I talked about the frustration that enterprises have with the lack of integration among security tactics – an egregious gap attributable in no small way to the extremely fragmented nature of the IT security industry itself. I offered a few examples of approaches that seek to close these gaps and equip [...]



By | April 5th, 2013|IT Management, Scott Crawford, Security|0 Comments

Security in 2013: Integration…and What You Will (and Won’t) See at RSA


It’s that time of year again, when New Year’s prognostications give way to a similar level of noise about what to look for at the RSA Conference.  There are always recurring themes to the latter. There is always much talk of the latest attack, or class of attack, that will drive where security should go. [...]



By | February 22nd, 2013|IT Management, Scott Crawford, Security|0 Comments

The Leverage Attack: Do We Really Get It?


“Give me a place to stand, and with a lever I will move the whole world.” –Archimedes In the wake of last week’s disclosure of an attack against Bit9, Jeremiah Grossman seems positively prescient. His New Year’s prediction about security’s immediate future was that attacks against security measures would increase. And why not? If defense [...]



By | February 11th, 2013|IT Management, Scott Crawford, Security|0 Comments

Security in 2013: Intelligence, Coordination and Integration (and Will We Get There?)


I’ve happily managed largely to avoid getting entangled in the New Year’s ritual of security predictions, since these can, frankly, be fairly boring. But for those who expect such, here you go: Attackers will continue to succeed. Determined adversaries will become even more so. Moving one set of playing pieces does not alter the objectives [...]



By | January 24th, 2013|IT Management, Scott Crawford, Security|0 Comments

Validating the Rise of Data-Driven Security: EMC/RSA Acquires Silver Tail


This morning, EMC’s RSA Security Division announced its intent to acquire Silver Tail Systems. The press release is here. I’ve written about Silver Tail before, going back to one of my first posts on the rise of data-driven security. In a five-part blog series introduced by that post, I described how data-driven security is evolving [...]



By | October 30th, 2012|IT Management, Scott Crawford, Security|0 Comments

Why I’m at IBM’s Information on Demand Conference This Week


This week, I’m at a big vendor’s big conference – a conference which, on the surface, may not appear to be primarily about security: IBM’s Information on Demand event in Las Vegas. “But you’re a security analyst.  Why are you going to IOD?” you ask. (And if you didn’t, let me explain:) With over 12,000 [...]



By | October 22nd, 2012|IT Management, Scott Crawford, Security|0 Comments

The Rise of Data-Driven Security: Research Report Now in the EMA Library


For the last several months, I’ve been heads-down on a research project that culminates over a year of investigation into the rise of what I have been calling “data-driven security”: security efforts informed and defined by their reliance on insight – and increasingly enabled by emerging technologies for large-scale data management, as well as by [...]



By | August 3rd, 2012|IT Management, Scott Crawford, Security|0 Comments

Data-Driven Security: What (and What Not) to Look For at RSA 2012


One of the major themes that will stand out at RSA next week revolves around the trend I’ve been following closely over the last several months: the evolution of security centered on a data-driven approach.  There will be many opportunities for you to learn and benefit from this trend that is having an impact on [...]



By | February 23rd, 2012|IT Management, Scott Crawford, Security|0 Comments

Data-Driven Security Articles Roundup: February 14, 2012


Happy Valentine’s Day, etc.  But enough chitchat. Herewith a short compendium of some of the articles and blogs about data-driven security I’ve been mentioning or have otherwise referenced recently – thought it would be worthwhile to pull these together into a single post. I’ll add to this list in future updates. We’ll begin with the [...]



By | February 14th, 2012|IT Management, Scott Crawford, Security|0 Comments
Load More Posts