We Used to Worry About Security Appliance Sprawl – Now It’s Endpoint Security...
Over the last 2-3 years, we’ve seen a lot of consolidation take place in the security industry; physically, functionally and from a business perspective. Security practitioners have struggled to gain a...
View ArticleSecurity Interoperability: Standards Are Great, Especially When They’re Yours…
Wow, this is a rant and a half…grab a beer, you’re going to need it… Jon Robinson pens a lovely summary of the endpoint security software sprawl discussion we’ve been chatting about lately. My...
View ArticleOn Bandwidth and Botnets…
An interesting story in this morning’s New York Times titled "Unlike U.S., Japanese Push Fiber Over Profit" talked about Japan’s long term investment efforts to build the world’s first all-fiber...
View ArticleThinning the Herd & Chlorinating the Malware Gene Pool…
Alan Shimel pointed us to an interesting article written by Matt Hines in his post here regarding the "herd intelligence" approach toward security. He followed it up here. All in all, I think both...
View ArticleThin Clients: Does This Laptop Make My Ass(ets) Look Fat?
Juicy Fat Assets, Ripe For the Picking… So here’s an interesting spin on de/re-perimeterization…if people think we cannot achieve and cannot afford to wait for secure operating systems, secure...
View ArticleEndpoint Security vs. DLP? That’s Part Of the Problem…
Larry Walsh wrote something (Defining the Difference Between Endpoint Security and Data Loss Prevention) that sparked an interesting debate based upon a vendor presentation given to him on "endpoint...
View ArticleCloudPassage & Why Guest-Based Footprints Matter Even More For Cloud Security
Image via Wikipedia Every day for the last week or so after their launch, I’ve been asked left and right about whether I’d spoken to CloudPassage and what my opinion was of their offering. In full...
View ArticleElemental: Leveraging Virtualization Technology For More Resilient &...
Yesterday saw the successful launch of Bromium at Gigamon’s Structure conference in San Francisco. I was privileged to spend some stage time with Stacey Higginbotham and Simon Crosby (co-founder, CTO,...
View ArticleThe Curious Case Of Continuous and Consistently Contiguous Crypto…
Here’s an interesting resurgence of a security architecture and an operational deployment model that is making a comeback: Requiring VPN tunneled and MITM’d access to any resource, internal or...
View Article