RSA 2011: A Thumbnail Peek at the Coming Week
One of nature’s great migrations will take place once again next week as the IT security world makes its annual pilgrimage to the RSA Conference in San Francisco. (And yes, dear, it means Valentine’s...
View ArticleThe Rise of Data-Driven Security, Part 5: Synthesis Platforms
(Ed. note: After too long a hiatus, I wanted to round out this series that began here and continued here, here and here. This will certainly not be the end of my coverage of data-driven security,...
View ArticleSecurity: A Big Data Problem?
Last week, I had the opportunity to spend a few days with a truly interesting and diverse group of practitioners, who I think are on to the future of information security. It will come as no surprise...
View ArticleSecurity in 2013: Intelligence, Coordination and Integration (and Will We Get...
I’ve happily managed largely to avoid getting entangled in the New Year’s ritual of security predictions, since these can, frankly, be fairly boring. But for those who expect such, here you go:...
View ArticleVerizon 2013 Data Breach Investigations Report: First Impressions
If there is one word that summarizes the 2013 Verizon Data Breach Investigations Report released today, it’s breadth. Breadth among the contributing organizations, and breadth of the data. 19 different...
View ArticleIntegration and Intelligence, Part 3: Toward Dynamic Defense
Last week, two vendor announcements were made that, on the surface, appear to be unrelated. Both, however, reflect larger trends that I’ve been following here – and despite appearances to the contrary,...
View Article
More Pages to Explore .....