Thoughts on Splunk .conf 2014


This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave [...]



By | October 24th, 2014|Security, Uncategorized|0 Comments

Dell SecureWorks and Risk I/O team up to deliver a better kind of Vulnerability Management


On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided [...]



By | April 29th, 2014|Security|0 Comments

Gaining Data Control with BYOD and Bluebox


What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control! Let’s face it, though it took an evolution of about 15 years, industry figured out that Data Management and Control are the underlying security issues.  Data is power, knowledge, money, control.  If you have it you’re in control.  If you [...]



By | April 22nd, 2014|BYOD, Cloud Computing, Data Sharing, Security|0 Comments

Symantec CyberWar Games Provide Valuable Cyber-Insight


The emotions oscillate between high frustration and high jubilation as I observe cyber-attack teams’ hacking activities against an unnamed financial institution… It’s the final day of the Symantec 2014 CyberWar Games Simulation taking place on Feb 20th in Symantec's World Headquarters in Mountain View, California. Almost two months ago, over 1100 Symantec employees representing 40 [...]



By | March 3rd, 2014|Uncategorized|0 Comments

CA Analyst Symposium- CA is Changing


I had an interesting experience a few weeks ago.  I went to NYC to brief with CA Technologies.  I spent a full day speaking in group sessions with some of its top executives including CEO, Mike Gregoire, EVP Technology and Development, Peter Griffiths, EVP Strategy and Corporate Development Jacob Lamm, as well as a 1 [...]



By | March 3rd, 2014|Security|0 Comments

ForeScout Technologies has a Knack for NAC (and more) with ControlFabric and CounterACT


Recently I briefed with ForeScout Technologies, a Network Admission/Access Control (NAC) vendor, to get an update on the CounterACT platform it has been delivering and developing for a few years and to see its recently announced ControlFabric technology.  I thought it wise to take another look at NAC vendors and how they address BYOD, rogue, [...]



By | January 3rd, 2014|Security|0 Comments
Load More Posts