Immigrants and Billionaires: Why are We Blaming Them?

Immigrants and Billionaires: Why are We Blaming Them?

| | Uncategorized
The blame game is a tricky effort these days. Maybe its part of the problem, not the solution. I cringed at many of the comments made across this year’s political theater. It seemed every other “base rallying cry” was directed at either evil immigrants or evil billionaires being called out ... Read More
“Quantum Matter” Anyone?

“Quantum Matter” Anyone?

| | Uncategorized
Eerie discoveries in thin substance research fuel speculation about what comes after silicon and oil. Is free energy around the corner? Last year a highly respected technologist (and friend) told me “free energy” was the most interesting and likely innovation on the horizon. When my eyebrows raised he continued, “Oh ... Read More
New Perspectives on Cloud Security: An Interview with Gururaj Pandurangi

New Perspectives on Cloud Security: An Interview with Gururaj Pandurangi

| | Uncategorized
The Capital One breach last year was significant on multiple fronts. A trusted financial services brand on a leading cloud IaaS environment was easily breached, to the tune of 10M records compromised. I discovered Cloudneeti in January after I heard about their ability to enable DevSecOps operating models. I asked ... Read More
Let’s Change the World

Let’s Change the World

| | Uncategorized
Thank you for the responses to the first “Three Questions” blog! Do you know of a company that’s helping to accelerate the future by closing the gap between dynamic infrastructure and static culture and tools? Contact me and I may ask that company’s CEO three questions. My only caveat is ... Read More
New Perspectives on SD-WAN: An Interview with Stefano Gridelli

New Perspectives on SD-WAN: An Interview with Stefano Gridelli

| | Uncategorized
SD-WAN deployment has accelerated in recent years as organizations extend SDN benefits across wide area networks. It’s a pretty transformative process, producing new management and cost benefits along with new user experience and performance demands. A few weeks ago I discovered NetBeez, a network monitoring company with a unique, proactive, ... Read More
As We Enter Another Cyber Year of Living Dangerously

As We Enter Another Cyber Year of Living Dangerously

| | Uncategorized
Within the next ten years half of today’s network security leaders will be either: 1) replaced by a new generation of leaders built upon advanced architectures; or 2) will have acquired new architectural offerings [while they still can] and evolved; or 3) be acquired by firms which have crossed the ... Read More
FiRe 2016: Global Flows and Disruptions: From the Economy to the Environment

The Firewall Chasm is…

| | Uncategorized
Network Effects are Powerful Since the early days of TCP/IP, connectivity has created waves of multi-billion-dollar markets, seemingly out of thin air. All of the successes have had one thing in common: they created unprecedented network effects. The 1990s ushered in the power of network effects. New levels of connectivity ... Read More
Power Panel -  IIOT: Apocalypse Now or Later, CUBE Conversation, August 2019

The Digital Age Maginot Line as Foreseen by Mel Brooks

| | Uncategorized
Attack Vectors in the… Trillions? The growing attack surface of the new industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewalls vendors is a more ominous reality few are talking about: the exponential vector problem. Yes ... Read More
Power Panel -  IIOT: Apocalypse Now or Later, CUBE Conversation, August 2019

The Digital Cyber Security Paradox

| | Uncategorized
Everything is Connected In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not be patched in any reasonable length of time. About 200 million ... Read More
Power Panel -  IIOT: Apocalypse Now or Later, CUBE Conversation, August 2019

IIoT: Apocalypse Now or Later

| | Uncategorized
The IIoT problem no one has been talking about, despite high profile attacks: “The hyper-converged infrastructures we’re building because of overwhelming business advantage is putting us at an overwhelming cybersecurity disadvantage.” – Archimedius blog Had a chance to talk about the problem with John Furrier, Bryan Skene and Gabe Lowy, ... Read More
Loading...