Richard Stiennon

Chief Research Analyst

IT-Harvest


Words of Wisdom From Renowned Industry Analysts

Posted on: 29 Jul 2020

If you read my books Secure Cloud Transformation and Security Yearbooks 2020 you probably noticed that I am exploring a new path in my writing journey. I am asking experts to contribute.…

Reducing Time-to-Resolution With Network Analytics

Posted on: 18 Apr 2017

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

VENOM Vulnerability Could Take Bite Out of Your Week

Posted on: 13 May 2015

The greatest fear of anyone running a virtual machine especially in a shared hosting environment is that an attack against one VM could jump the wall and impact the other…

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

Posted on: 14 Apr 2015

In 1995 a small security reseller in Southfield, Michigan, introduced possibly the first “cloud” based firewall: Check Point FW1 running on Sun Netra boxes in their small data center. Netrex…

The Sony Breach is Not The Government’s Problem

Posted on: 19 Dec 2014

If the first indication that you have been hacked is your screens going blank or displaying an attacker’s message you are in real trouble. Another indicator that your organization does…

Splitting Symantec is the Right Thing To Do – Now it is Intel’s Turn

Posted on: 10 Oct 2014

The current flurry of breakups in the tech sector is gratifying to watch. The only conglomerate strategy I have ever seen work effectively is Alfred P. Sloan’s revolutionary “centralized decentralization”…

The Thanks-Rob Worm to Come

Posted on: 25 Sep 2014

By now you have heard about a new bug in one of the most popular Unix shell programs, the Bourne Shell, or bash.  If you run Mac OSX you probably…

Global Border Gateway Protocol (BGP) IP Tables Peak Past 512K

Posted on: 13 Aug 2014

We all knew it was coming. As more and more networks are created and the IP address space is subdivided more and more the global routing table that backbone routers…

LinkedIn Scammer Techniques Are Getting Scary

Posted on: 12 Aug 2014

This is an update to the article  about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts: 1.Look at that URL.…

NetScout’s Great Blunder: Suing Gartner

Posted on: 11 Aug 2014

NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a “pay-to-play” business model. The suit states that Gartner made false and defamatory statements regarding NetScout,…