Breach Detection, Sony Entertainment and Vectra Networks…

Breach Detection, Sony Entertainment and Vectra Networks…

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year. Recent articles revealed that some employees thought that the hack was, “a long time coming,”[1] and stolen information that was released indicated “passwords were easy to find.”[2] There are other articles disclosing various technology issues and outages shortly before the information was released. Though blamed on employee carelessness and technology failure, these ...

Read More

Allgress Insight Risk Management Suite Brings Flexibility and Functionality to IT-GRC

Allgress Insight Risk Management Suite Brings Flexibility and Functionality to IT-GRC

When I started out in security, only very large organizations with a mature set of business processes dared to talk about implementing some form of governance, risk, and compliance (GRC) or enterprise program (e-GRC). They generally did it in an attempt to get ISO or similar certification, or to “move their programs to the next level,” and some, I think, attempted it just to prove they did it. Many of those efforts were monumental, costing millions of dollars and taking years to complete. However, a significant number seemed to end in compromise, yielding a smaller end result or totally failing ...

Read More

Service Automation: Key for Maximizing IT and Business Efficiency

Service Automation: Key for Maximizing IT and Business Efficiency

The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at a minimum cost. How is it possible for IT to accommodate such demands? Two themes that emerge from both EMA research and practitioner dialogue are “automation” and “service awareness.” Taking a service-centric approach to automation allows the IT organization to both accelerate delivery and improve the ...

Read More

arrows_opposite_directions_300x190px

In my last post, I talked about the frustration that enterprises have with the lack of integration among security tactics – an egregious gap attributable in no small way to the extremely fragmented nature of the IT security industry itself. I offered a few examples of approaches that seek to close these gaps and equip...

Read More »



puzzle_house-300x190

Almost one year into the discussion about the Software Defined Data Center (SDDC), it is time to take inventory of the state of the discipline. As a reminder, the ultimate goal of the SDDC is to abstract and centralize the management of compute, network, storage, operating systems, middleware and applications in order to dynamically place...

Read More »



Rooster

SDN does not spell doom and gloom for traditional networking vendors – that is just a lot of hype drummed up by some who have a different story to tell and who tend to come from datacenter centric mindsets.  Too often when something new and game changing comes along, folks are all too willing to...

Read More »



posted by John Myers   | February 27, 2013 | 0 Comments

Data_Management

As I review my series of #100linesOnBIDW blogs over the last couple of weeks, I found myself looking at the Data Management posting. I covered when to apply schemas, Big Data, and data governance. What I left out was technical implementation concepts for data management systems like row vs. column orientation; in-memory vs. spinning disk...

Read More »



4-puzzle_pieces

It’s that time of year again, when New Year’s prognostications give way to a similar level of noise about what to look for at the RSA Conference.  There are always recurring themes to the latter. There is always much talk of the latest attack, or class of attack, that will drive where security should go....

Read More »



posted by John Myers   | February 18, 2013 | 0 Comments

actionable_intelligence

If I told you in September that the Baltimore Ravens would win the Super Bowl in February and you did nothing with that information ( i.e. place a bet, announce your prognostication skill, etc. ), was my prediction worth anything? Much like “if a tree falls in the forest and no one is there to...

Read More »



posted by Scott Crawford   | February 11, 2013 | 0 Comments

Earth_Lever-300x190

“Give me a place to stand, and with a lever I will move the whole world.” –Archimedes In the wake of last week’s disclosure of an attack against Bit9, Jeremiah Grossman seems positively prescient. His New Year’s prediction about security’s immediate future was that attacks against security measures would increase. And why not? If defense...

Read More »



Knowledge_Delivery

Albert Einstein once said: “Imagination is more important than knowledge. For knowledge is limited to all we now know and understand, while imagination embraces the entire world, and all there ever will be to know and understand.” And I think that the wonderful world of Knowledge Delivery (aka Data Visualization, Reporting, etc.) needs to think...

Read More »



posted by John Myers   | February 11, 2013 | 0 Comments
Edward de Bono, a noted expert on creative thinking, once said: The purpose of science is not to analyze or describe but to make useful models of the world. A model is useful if it allows us to get use out of it. Business Analytics is very similar to this concept of science, and specifically,...

Read More »



posted by Shawn Rogers   | February 8, 2013 | 0 Comments

magnifying-glass-300x190

I am a big fan of data discovery solutions. They enable a wider group of users to enjoy the benefits of business insights and break away from the platform driven traditional solutions that can be difficult to use, extremely expensive and limited to only a few users within an organization. At MicroStrategy World last week...

Read More »



Page 10 of 35« First...«89101112»2030...Last »