Most Recent Blogs

F5 Agility conference: somebody familiar, some things are new

Posted: August 24, 2016   /   By: Dan Conde   /   Tags: networking, F5

Chicago.jpgVisiting the F5 Agility conference in Chicago recently showed me that the company is adapting to major changes in the industry and evolving its product line to keep up with the changes.

There was an interesting combination of the familiar and new.

Read More

The pressing need for network security operations automation

Posted: August 23, 2016   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, network security operations

network security automationAccording to ESG research, 63% of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security operations is more difficult today than it was two years ago.

Why?

Because enterprises have to deal with more connected devices, network traffic, and applications than two years ago. What’s more 47% of respondents claim that it is difficult to monitor network behavior from end-to-end while 41% claim that network security operations difficulties result from increasing use of cloud computing.

Read More

Contemplating the internet's impact on society

Posted: August 18, 2016   /   By: Dan Conde   /   Tags: networking

internet movie

A new film examines society's reliance on the internet and the good and bad effects of global connectivity. You don't expect to find movie reviews on Network Computing, but a film produced by a networking company that examines the effect of the internet on society is an unusual event.

Lo and Behold: Reveries of a Connected World by German filmmaker Werner Herzog, released in selected theaters and available for streaming Friday, provides a unique, thought-provoking view of technology.

 

Read More

More on operationalizing threat intelligence

Posted: August 17, 2016   /   By: Jon Oltsik   /   Tags: cybersecurity, threat intelligence, security analytics

threat intelligenceComing out of Black Hat a few weeks ago, it’s pretty frightening what’s going on with cyber-threats.  Overall malware volume is down but the number of variants has gone up precipitously. In fact, according to the Webroot threat report, about 97% of all malware variants are seen only one time. In other words, they are designed to target and attack specific organizations.

Read More

Why you still need backup … and beyond

Posted: August 12, 2016   /   By: Jason Buffington   /   Tags: Backup, data protection, CommVault

The foundation of any data protection, preservation, and availability strategy is grounded in “backup,” period. Yes, a majority of organizations supplement backups with snapshots, or replicas, or archives, as shown in what ESG refers to as the Data Protection Spectrum:

Spectrum-DP-2016.png

Read More

CISO portfolio management

Posted: August 11, 2016   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, endpoint security, CISO

Cybersecurity_portfolio.jpgEnterprise CISOs are in an unenviable position. Given today’s dangerous threat landscape and rapidly evolving IT initiatives, CISOs have a long list of tasks necessary for protecting sensitive data and IT assets. At the same time, however, most organizations are operating with a shortage of skilled cybersecurity professionals. According to ESG research, 46% of organizations claim that they have a “problematic shortage” of cybersecurity skills in 2016.

Read More

Six for 16: Black Hat 2016 takeaways

Posted: August 08, 2016   /   By: Doug Cahill   /   Tags: black hat 2016

black hat 2016 recapWith the largest Black Hat to date now in the rear view mirror, it’s clear there is edginess not only in the hacker community, but also in hot cybersecurity market segments where vendors are competing for thought leadership as well as wallet share.

SuperZoo 2016, a pet retailer show, provided a bizarre, but fitting backdrop including those of the furry, four-legged variety co-mingling with the cybersecurity industry. I had the opportunity to speak with CISOs, vendors, threat researchers, and catch up with friends. After navigating the up and down escalators of Mandalay Bay, I left with these takeaways:

Read More

A few thoughts from Black Hat 2016

Posted: August 08, 2016   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, endpoint security, black hat 2016

black hat 2016 recapLast week’s Black Hat 2016 conference was a whirlwind of activity. Here are a few of my takeaways:

Read More

Four ways to de-escalate the marketing wars

Posted: August 02, 2016   /   By: Adam Sell   /   Tags: marketing, marketing wars, inbound marketing

marketing battle ideasAsk any marketing professional at a small or medium-sized business — virtually every organization struggles with battles between marketing and other departments. Often, the fights erupt between the inbound marketing and the inside sales teams; how is a marketing-qualified lead defined, at what stage in the lead nurturing process is the contact handed over to the inside sales team, what activity markers are the strongest buying indicators, etc.

But it doesn't stop there. Marketing battles with engineering, senior management, and the services/support teams can also bring collaborative efforts to a screeching halt. Tension between departments is the easiest way to break a strong company culture, and letting that tension fester can turn cynicism into resentment and victimization.

There are ways to break the cycle of antagonization, though. Consider these four ways to de-escalate marketing's wars and reestablish harmony with the people who work with you to present your company's public face: 

Read More

Oracle's long game for cloud

Posted: August 01, 2016   /   By: Dan Conde   /   Tags: cloud

oracle netsuiteOracle announced last week that it has entered into a definitive agreement to acquire NetSuite. It's a good move for them to acquire a SaaS vendor. According to ESG research, Oracle is not perceived as one of the top viable competitors or alternatives to Amazon AWS as a cloud infrastructure service provider, so trying to jump-start the IaaS business would have been difficult, even with the deep pockets that Oracle has.

Read More

Posts by Topic

see all