The Technology You Own, Ends Up Owning You

The Technology You Own, Ends Up Owning You

In a recent article, Rupert Goodwins wrote that Information Security technology is a sham. His thesis is that for all the innovative technologies in the marketplace, they routinely fail to fulfill their fundamental purpose of protecting a business. Every new breach...

The Battle for Endpoint Security Begins (Again)

It is hard to imagine a PC these days without a taskbar filled with various agents, tools, and monitors. There was a time in the history of PCs when the idea of even running anti-virus was ridiculous. Those days are long since gone. Rise of the Endpoint Security Suite...

Security Analytics Part 1: The Game is On

NOTE: This is the first part of a three part series exploring the Security Analytics market.  “The world is full of obvious things which nobody by any chance ever observes.”  – Sherlock Holmes Deep inside the systems, networks, data and applications...