Richard Stiennon

Chief Research Analyst

IT-Harvest


Using Trust Interfaces to Build an IT Security Strategy

Posted on: 11 Apr 2014

After presenting this week at InfoSecWorld 2014 on Why Risk Management Fails, I was asked by a frustrated risk management professional how to build an IT security program. The days…

The Latest on the Heartbleed Bug

Posted on: 10 Apr 2014

In the days since the Heartbleed Bug, a vulnerability in OpenSSL heart beat function, was exposed we have begun to see signs of the Internet bleeding out. Bruce Schneier ranks…

Heartbleed Vulnerability is a Major Heartache

Posted on: 08 Apr 2014

The announcement yesterday of a widely deployed vulnerability in OpenSSL, the Heartbleed Bug, is set to shake up the security industry. According to the discoverers at Codenomicon and Google, all Apache…

Firewall Policy Management Evolves to Security Policy Orchestration

Posted on: 07 Apr 2014

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Cyber Policy Experts to Follow on Twitter

Posted on: 05 Apr 2014

The emerging field of cyber policy is attracting government, academic, and technology experts. Here is a list of cyber policy experts from around the world who are well worth following…

Breach Detection Report From NSS Labs Defines Winners/Losers

Posted on: 04 Apr 2014

NSS Labs has issued the first test results of Breach Detection Systems (BDS). Breach Detection, sometimes called Advanced Malware Defense, is usually a gateway device that inspects downloaded executables by…

Why Is Congress So Hot on Information Sharing?

Posted on: 03 Apr 2014

A perplexing question for those in IT security is why are so many in government pushing for “information sharing” as their solution to the cyber crisis? The crisis is apparent…

Where Are the US Tech Heroes?

Posted on: 02 Apr 2014

It has been three months since the world learned that the NSA’s Signals Intelligence Directorate, through its Tailored Access Operations (TAO) has been deploying backdoors in Cisco, Juniper, Huawei, Dell,…

Never The Twain Shall Meet: Why Network Security Vendors Should Stay Away From End Point Security, and Vice-Versa

Posted on: 01 Apr 2014

There would be many more successful security companies if their founders and leaders had a better understanding of the IT security space. One fallacy that will not die is the…

How Symantec Can Pull Out of a Tail Spin

Posted on: 24 Mar 2014

It should come as no surprise to anyone that Symantec’s recently fired CEO Steve Bennett’s strategy of cut costs and improve operations has failed miserably. As I wrote when Symantec’s…