Quantcast
Channel: Endpoint Security – Rational Survivability
Browsing latest articles
Browse All 9 View Live

Image may be NSFW.
Clik here to view.

We Used to Worry About Security Appliance Sprawl – Now It’s Endpoint Security...

Over the last 2-3 years, we’ve seen a lot of consolidation take place in the security industry; physically, functionally and from a business perspective. Security practitioners have struggled to gain a...

View Article



Image may be NSFW.
Clik here to view.

Security Interoperability: Standards Are Great, Especially When They’re Yours…

Wow, this is a rant and a half…grab a beer, you’re going to need it… Jon Robinson pens a lovely summary of the endpoint security software sprawl discussion we’ve been chatting about lately. My...

View Article

Image may be NSFW.
Clik here to view.

On Bandwidth and Botnets…

An interesting story in this morning’s New York Times titled "Unlike U.S., Japanese Push Fiber Over Profit" talked about Japan’s long term investment efforts to build the world’s first all-fiber...

View Article

Image may be NSFW.
Clik here to view.

Thinning the Herd & Chlorinating the Malware Gene Pool…

Alan Shimel pointed us to an interesting article written by Matt Hines in his post here regarding the "herd intelligence" approach toward security.  He followed it up here.  All in all, I think both...

View Article

Image may be NSFW.
Clik here to view.

Thin Clients: Does This Laptop Make My Ass(ets) Look Fat?

Juicy Fat Assets, Ripe For the Picking… So here’s an interesting spin on de/re-perimeterization…if people think we cannot achieve and cannot afford to wait for secure operating systems, secure...

View Article


Image may be NSFW.
Clik here to view.

Endpoint Security vs. DLP? That’s Part Of the Problem…

Larry Walsh wrote something (Defining the Difference Between Endpoint Security and Data Loss Prevention) that sparked an interesting debate based upon a vendor presentation given to him on "endpoint...

View Article

Image may be NSFW.
Clik here to view.

CloudPassage & Why Guest-Based Footprints Matter Even More For Cloud Security

Image via Wikipedia Every day for the last week or so after their launch, I’ve been asked left and right about whether I’d spoken to CloudPassage and what my opinion was of their offering.  In full...

View Article

Image may be NSFW.
Clik here to view.

Elemental: Leveraging Virtualization Technology For More Resilient &...

Yesterday saw the successful launch of Bromium at Gigamon’s Structure conference in San Francisco. I was privileged to spend some stage time with Stacey Higginbotham and Simon Crosby (co-founder, CTO,...

View Article


Image may be NSFW.
Clik here to view.

The Curious Case Of Continuous and Consistently Contiguous Crypto…

Here’s an interesting resurgence of a security architecture and an operational deployment model that is making a comeback: Requiring VPN tunneled and MITM’d access to any resource, internal or...

View Article

Browsing latest articles
Browse All 9 View Live




Latest Images