This is the final part of our three-part series on Security Analytics. You can view Part 1 and Part 2 here. In Part 1 and 2 of this series, we looked at the technology behind Security Analytics (SA) and where these technologies are going. In this final part, we will...
NOTE: This is the second part of a three-part series exploring the Security Analytics market. Read Part 1 and Part 3. In Part I of this report, we explored the fundamentals of the Security Analytics market and technologies within that market. In this part, we will...
NOTE: This is the first part of a three part series exploring the Security Analytics market. “The world is full of obvious things which nobody by any chance ever observes.” – Sherlock Holmes Deep inside the systems, networks, data and applications...
War is beginning. Not in a galaxy far away, but to the industrial controls that make our life here on earth bearable. Inside every electric utility, sewage processing site, nuclear plant, and other industrial sites there is a whole army of SCADA devices controlling...
One of the things I enjoy is analyzing the language of the security industry. Language not only communicates ideas, but also intentions, aspirations, and fears. One of those words that I find fascinating “Next Generation Firewalls,” (NGFW). This blog first addressed...
One of the big things I hear IT people, especially at larger organizations, discuss is the idea of BYOD or “Bring your own device.” Naturally, the first question is, how will this affect security? Let’s cut to the chase. Can BYOD be done and...