Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in this case, they determine how a cloud environment can be used to enhance and scale authentication for a service that can be cloud-based or private data center-based. Just last week, CSA announced the results of a worldwide Hackathon against an implementation of their Software Defined Perimeter ...

Read More

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, to persistently defend the endpoint as a beachhead against undesired, malicious processes trying to execute. Each has its use cases and strong points, but together they provide a significantly broader perspective and richer context for driving response. While sitting on the network and inspecting packets allows for ...

Read More

Thoughts on Splunk .conf 2014

Thoughts on Splunk .conf 2014

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have ...

Read More

posted by Scott Crawford   | February 14, 2012 | 0 Comments
Happy Valentine’s Day, etc.  But enough chitchat. Herewith a short compendium of some of the articles and blogs about data-driven security I’ve been mentioning or have otherwise referenced recently – thought it would be worthwhile to pull these together into a single post. I’ll add to this list in future updates. We’ll begin with the...

Read More »



See Torsten’s guest blog at Parallels. Torsten will be attending Parallels Summit 2012 (February 14th-16th) in Orlando,...

Read More »



posted by John Myers   | February 9, 2012 | 0 Comments

noSQLFeatureGraphic2-300x154

If you look at the history of Big Data requirements (volume, velocity and variety), and the NoSQL platforms supporting those requirements, you see a history of organizations and development teams breaking the mold of traditional information technology (IT) programs. Instead of following the traditional IT methodologies to solve the Big Data issues, these teams pushed...

Read More »



posted by    | February 9, 2012 | 0 Comments

crystal_ball2-217x300

Here is my yearly prediction column, a bit delayed. Topic of the day is next generation IT management. (Not next generation IT; plenty of folks are covering that!) The tools market for IT service management is glutted. My friend Jan van Bon has been curating a list.ly list of “ITIL tools” that is now up...

Read More »



posted by Dennis Drogseth   | February 9, 2012 | 0 Comments
On the one hand, many in the industry have begun todismiss the CMDB as well past its prime, at least in terms of industry hype and attention. For this rather significant population, the CMDB has evolved into a complex and demanding data store with tangible but difficult-to-justify benefits, with questionable relationships to cloud computing and...

Read More »



posted by Torsten Volk   | February 8, 2012 | 0 Comments

iStock_000015096562XSmall-300x261

Why pay $1,500 per virtual desktop, if you can have a physical machine of the same performance-level at half the cost. While the functional and maintenance advantages of virtual desktop computing are evident, the per machine CAPEX often is the key stumbling block for this type of project. It is very hard to convince your...

Read More »



Legal-Tech-New-York-2012-287x300

My introduction to LegalTech New York 2012 (LTNY) began not with last Monday morning’s keynote session but with a chance meeting, over the paper recycling bin, with a recently hired CIO of a mid-size national law firm who, like me, was unburdening himself of extraneous event announcements and other unwanted sheaves of written materials prior...

Read More »



posted by Tracy Corbo   | February 7, 2012 | 0 Comments
On September 6, Nicira, a startup network virtualization company, unveiled its Network Virtualization Platform (NVP). NVP is a software-based system that creates a distributed virtual network infrastructure in cloud data centers that is completely decoupled and independent from physical network hardware. Nicira has announced that well known entities such as AT&T, eBay, Fidelity Investments, NTT...

Read More »



posted by Shawn Rogers   | February 6, 2012 | 0 Comments

Virtual_Data

As we move into 2012 analytics and business intelligence continue to be top of mind for C-level executives. Discovering new ways to leverage our existing systems coupled with the need to access new and dynamic data sources has exposed a lack of flexibility in traditional data management infrastructures. This lack of agility curtails innovation and...

Read More »



Another report of a breach at a technology vendor much of the industry depends upon for security and trust; this time, Verisign. The most immediate concern about this incident was that the attacks in question occurred in 2010, and were not widely known until Reuters discovered the disclosure in the company’s reporting as required to...

Read More »



Page 17 of 35« First...10«1516171819»2030...Last »