Words of Wisdom From Renowned Industry Analysts
Posted on: 29 Jul 2020
If you read my books Secure Cloud Transformation and Security Yearbooks 2020 you probably noticed that I am exploring a new path in my writing journey. I am asking experts to contribute.…
Reducing Time-to-Resolution With Network Analytics
Posted on: 18 Apr 2017
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
VENOM Vulnerability Could Take Bite Out of Your Week
Posted on: 13 May 2015
The greatest fear of anyone running a virtual machine especially in a shared hosting environment is that an attack against one VM could jump the wall and impact the other…
Clean Pipes At Last: Zscaler Introduces Cloud Firewall
Posted on: 14 Apr 2015
In 1995 a small security reseller in Southfield, Michigan, introduced possibly the first “cloud” based firewall: Check Point FW1 running on Sun Netra boxes in their small data center. Netrex…
The Sony Breach is Not The Government’s Problem
Posted on: 19 Dec 2014
If the first indication that you have been hacked is your screens going blank or displaying an attacker’s message you are in real trouble. Another indicator that your organization does…
Splitting Symantec is the Right Thing To Do – Now it is Intel’s Turn
Posted on: 10 Oct 2014
The current flurry of breakups in the tech sector is gratifying to watch. The only conglomerate strategy I have ever seen work effectively is Alfred P. Sloan’s revolutionary “centralized decentralization”…
The Thanks-Rob Worm to Come
Posted on: 25 Sep 2014
By now you have heard about a new bug in one of the most popular Unix shell programs, the Bourne Shell, or bash. If you run Mac OSX you probably…
Global Border Gateway Protocol (BGP) IP Tables Peak Past 512K
Posted on: 13 Aug 2014
We all knew it was coming. As more and more networks are created and the IP address space is subdivided more and more the global routing table that backbone routers…
LinkedIn Scammer Techniques Are Getting Scary
Posted on: 12 Aug 2014
This is an update to the article about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts: 1.Look at that URL.…
NetScout’s Great Blunder: Suing Gartner
Posted on: 11 Aug 2014
NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a “pay-to-play” business model. The suit states that Gartner made false and defamatory statements regarding NetScout,…