View Post

If David Bowie ran your cloud security

OK, let’s get something straight.  We wouldn’t have hired David Bowie to run our SOC either.  Too expensive & wanted only purple M&M’s in the data center.  But there are some things we can learn from him about how we go about our own work… Transform… Game Changer?  Ziggy Stardust!?!   ‘nuf said! Execute… The guy was relentless in his pursuit of excellence …

View Post

Surviving the Bigfoot Zombie Endpoint Security Apocalypse of 2016

Your problem is that you think you’ve killed the latest round of malware, it comes climbing through your Windows and creeping through your back door. Register for our Cylance webinar tomorrow (Thursday, January 7th) at 2PM EDT, and we’ll show you how to put the final bullet in the head of your malware problem. Webinar – Using AI for AV We’ll demonstrate how deep machine …

View Post

Let’s rap about the next biggest mega trend in InfoSec

We’ve been presenting this slide deck to security groups across the Midwest. (This version includes speaker’s notes)  Here’s the “reader’s digest version” of our new reality…   The kill-chain is incredibly more complex than anything we’ve ever had to handle.  NEST… fitbit… cameras on game stations…  These are a microcosm of the new perimeter on our corporate networks. New attack vectors involve not just InfoSec… but physical security, operational security, social media, …

View Post

LEAN can Teach Us to be More Proactive & Results Focused

IT organizations’ time & resources tend to be overwhelmingly oriented toward being reactive rather than proactive.  How do we flip that?  Lean/6sigma can help us address that. Working with many types of IT organizations, I’ve taught myself to be an acute observer of how organizations go about their technology selection process.  I’ve noticed a close correlation between the amount of …

View Post

Is Gartner’s Magic Quadrant Really Magic? Part 6

The Bottom Line!… One more thing about Gartner’s analysis and the way they could serve the greatest good with their magic quadrants. As I muddled over the MDM & NAC reports in preparing for this four part blog, I realized that there’s something missing in both these reports. Allow me to explain. When we’re doing the business justification for an …

View Post

Is Gartner’s Magic Quadrant Really Magic? Part 5

Using History as Our Guide… I keep running into organizations that are struggling with two critical areas where Network Access Control (NAC) can help them resolve key security issues: Helping to get under control the explosion of personal devices being used for business applications… some call it BYoD… others… the “consumerization of IT”… mobile devices accessing corporate resources. How to …

View Post

Is Gartner’s Magic Quadrant Really Magic? Part 4

My humble confession… OK. OK. I have a confession. Let me get it off my chest. I, too, have been guilty of taking a quick look at a ‘Magic Quandrant’ report, zero’ing in on the ‘Leaders Quadrant’, and jumping to a conclusion, “Oh look! <<insert hot technology here>> must be the best!” To Gartner’s credit, they state that they don’t …

View Post

Is Gartner’s Magic Quadrant Really Magic? Part 3…MDM

Similar to my question in “Is Gartner’s Magic Quadrant Really Magic? Part 1…”, I’d like to point out something that has bothered me since the latest MDM magic quadrant came out. At the top of Gartner’s “Magic Quadrant for Mobile Device Management 2013” are MobileIron & AirWatch. Digging into the analysis of those two very good vendors, I found under …

View Post

Push the dialing out….

When you look at the history of the telephone, the evolution of dialing followed a pattern. It was simple that the phone company moved more and more tasks to the user. Think of the earliest days, an operator having to respond to a light that the caller turned on, then manually connect wires and then disconnect when done. It didn’t …

View Post

Big guys & gap fillers

You’re probably familiar with the Pareto Principle, commonly called the 80/20 rule. If we loosely apply that “rule” here, it’s probably safe to assume your “Top 5” vendors make up more than 80% of your capital budget. It’s also pretty safe to assume that the amount of time, attention & frustration for you & your team on all the other …