As We Enter Another Cyber Year of Living Dangerously

As We Enter Another Cyber Year of Living Dangerously

| | Uncategorized
Within the next ten years half of today’s network security leaders will be either: 1) replaced by a new generation of leaders built upon advanced architectures; or 2) will have acquired new architectural offerings [while they still can] and evolved; or 3) be acquired by firms which have crossed the ... Read More
FiRe 2016: Global Flows and Disruptions: From the Economy to the Environment

The Firewall Chasm is…

| | Uncategorized
Network Effects are Powerful Since the early days of TCP/IP, connectivity has created waves of multi-billion-dollar markets, seemingly out of thin air. All of the successes have had one thing in common: they created unprecedented network effects. The 1990s ushered in the power of network effects. New levels of connectivity ... Read More
Power Panel -  IIOT: Apocalypse Now or Later, CUBE Conversation, August 2019

The Digital Age Maginot Line as Foreseen by Mel Brooks

| | Uncategorized
Attack Vectors in the… Trillions? The growing attack surface of the new industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewalls vendors is a more ominous reality few are talking about: the exponential vector problem. Yes ... Read More
Power Panel -  IIOT: Apocalypse Now or Later, CUBE Conversation, August 2019

The Digital Cyber Security Paradox

| | Uncategorized
Everything is Connected In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not be patched in any reasonable length of time. About 200 million ... Read More
Power Panel -  IIOT: Apocalypse Now or Later, CUBE Conversation, August 2019

IIoT: Apocalypse Now or Later

| | Uncategorized
The IIoT problem no one has been talking about, despite high profile attacks: “The hyper-converged infrastructures we’re building because of overwhelming business advantage is putting us at an overwhelming cybersecurity disadvantage.” – Archimedius blog Had a chance to talk about the problem with John Furrier, Bryan Skene and Gabe Lowy, ... Read More
The New Network Security Equation We’re Discovering by Accident: IT<IIoT

The New Network Security Equation We’re Discovering by Accident: IT<IIoT

| | Uncategorized
Right after we celebrate the birthdays of two of the most destructive cyber attacks ever launched (WannaCry and NotPetya) a disturbing VxWorks advisory is issued for billions of IoT devices, and perhaps millions of them are unpatchable. There is a simple, fundamental equation that no one seems to grasp when ... Read More
Health Care Digitalization Brings New Security Challenges

Health Care Digitalization Brings New Security Challenges

| | Uncategorized
The advantages of digitalization are well documented and understood, especially in health care. Patients, for example, benefit when their doctors can access critical data by simply plugging a device into a wall jack. That wall jack typically connects to every other connected device in the hospital. If the hospital is ... Read More
Happy Birthday WannaCry

Happy Birthday WannaCry

| | Uncategorized
Microsoft released a patch update to… Windows XP? What’s up with that? Here are highlights from Ars Technica ( Dan Goodin) augmented with recent commentary: Microsoft is warning that the Internet could see another exploit with the magnitude of the WannaCry attack that shut down computers all over the world ... Read More
The Zero Trust Paradox

The Zero Trust Paradox

| | Uncategorized
Or The Zero Trust Graveyard… your choice. I just glanced through an analyst report on “zero trust” and noted the sizable eco-system of startups and security cartel players who have all managed to join the party. After all, it’s a noble aim. If there isn’t a way for an untrusted ... Read More
Connecting the Dots on OT/IT Convergence

Connecting the Dots on OT/IT Convergence

| | Uncategorized
Gabe is Back In the heady days of massive network infrastructure growth there was a single analyst who knew the vendors cold. And all of us on the Wall Street briefing circuit knew Gabe Lowy. Gabe didn’t waste time with small talk. On the way to the conference room he ... Read More
Loading...