Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in this case, they determine how a cloud environment can be used to enhance and scale authentication for a service that can be cloud-based or private data center-based. Just last week, CSA announced the results of a worldwide Hackathon against an implementation of their Software Defined Perimeter ...

Read More

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, to persistently defend the endpoint as a beachhead against undesired, malicious processes trying to execute. Each has its use cases and strong points, but together they provide a significantly broader perspective and richer context for driving response. While sitting on the network and inspecting packets allows for ...

Read More

Thoughts on Splunk .conf 2014

Thoughts on Splunk .conf 2014

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have ...

Read More

posted by John Myers   | February 18, 2013 | 0 Comments

actionable_intelligence

If I told you in September that the Baltimore Ravens would win the Super Bowl in February and you did nothing with that information ( i.e. place a bet, announce your prognostication skill, etc. ), was my prediction worth anything? Much like “if a tree falls in the forest and no one is there to...

Read More »



posted by Scott Crawford   | February 11, 2013 | 0 Comments

Earth_Lever-300x190

“Give me a place to stand, and with a lever I will move the whole world.” –Archimedes In the wake of last week’s disclosure of an attack against Bit9, Jeremiah Grossman seems positively prescient. His New Year’s prediction about security’s immediate future was that attacks against security measures would increase. And why not? If defense...

Read More »



Knowledge_Delivery

Albert Einstein once said: “Imagination is more important than knowledge. For knowledge is limited to all we now know and understand, while imagination embraces the entire world, and all there ever will be to know and understand.” And I think that the wonderful world of Knowledge Delivery (aka Data Visualization, Reporting, etc.) needs to think...

Read More »



posted by John Myers   | February 11, 2013 | 0 Comments
Edward de Bono, a noted expert on creative thinking, once said: The purpose of science is not to analyze or describe but to make useful models of the world. A model is useful if it allows us to get use out of it. Business Analytics is very similar to this concept of science, and specifically,...

Read More »



posted by Shawn Rogers   | February 8, 2013 | 0 Comments

magnifying-glass-300x190

I am a big fan of data discovery solutions. They enable a wider group of users to enjoy the benefits of business insights and break away from the platform driven traditional solutions that can be difficult to use, extremely expensive and limited to only a few users within an organization. At MicroStrategy World last week...

Read More »



posted by Scott Crawford   | January 29, 2013 | 0 Comments

data-explosion_300x190

In my last post, I noted that I expect intelligence and the coordination and integration of defense technologies to be key drivers of the IT security market in 2013.  This is not just about some major vendors who have acknowledged their need for a wake-up call on these fronts. These are larger trends that are...

Read More »



posted by John Myers   | January 28, 2013 | 0 Comments

Data_Management

When Aesop created the fable about the shepherd boy who cried wolf, the message was clear: “How liars are not rewarded: even if they tell the truth, no one believes them” If analysts like myself and others as well as the mainstream press (ie Forbes, Harvard Business Review, Economist ) continue to shout about Big Data...

Read More »



Binoculars-in-grass_300x190

I’ve happily managed largely to avoid getting entangled in the New Year’s ritual of security predictions, since these can, frankly, be fairly boring. But for those who expect such, here you go: Attackers will continue to succeed. Determined adversaries will become even more so. Moving one set of playing pieces does not alter the objectives...

Read More »



Juniper_Networks

Juniper’s SDN strategy is well thought out and is not dissimilar to Cisco’s approach in that they are looking to make their network equipment less rigid and more flexible and adaptable. Oh and I do look forward to hearing more about the plans for “centralizing the appropriate aspects of the management, services and control software...

Read More »



Data_Integration

“Back in the day”, Pablo Picaso once said: Give me a museum and I’ll fill it. Data Integration in 2013 seems to follow along similar lines – Give us a Platform and we will fill it with data. This is part two of a series of blog postings on important topics for the world of...

Read More »



Page 10 of 35« First...«89101112»2030...Last »