Scaling Network Security: The Scaled Network Security Architecture

Posted under: Research and Analysis After going into the challenges with existing network security architectures (RIP Moat), we laid out a number of requirements for the new network security. This includes the need for scale, intelligence and flexibility. This sounds all good and well, but how do you get there? ... Read More

Scaling Network Security: The New Network Security Requirements

Posted under: In the last post, we bid adieu to The Moat, given the encapsulation of almost everything into standard web protocols and movement of critical data to an increasing number of cloud services. Additionally, the insatiable demand for bandwidth further complicates how network security scales. Thus, now it’s time ... Read More
Scaling Network Security: RIP Moat

Scaling Network Security: RIP Moat

Posted under: Research and Analysis Those young people today laugh at those with a couple of decades of experience when they rue about the good old days, when your network was snaked along the floors of your office (shout out for Thicknet!) and trusted users were on the corporate network ... Read More

SecMon State of the Union: The Buying Process

Posted under: Research and Analysis Now that you’ve revisited your important use cases, and derived a set of security monitoring requirements, it’s time to find the right fit among the dozens of alternatives. To wrap up this series we will bring you through a reasonably structured process to narrow down ... Read More

SecMon State of the Union: Refreshing Requirements

Posted under: Research and Analysis Now that you understand the use cases for security monitoring, the next step in our journey is to translate those use cases to requirements for your strategic security monitoring platform. In other words, now that you have an idea of the problem(s) you need to ... Read More

SecMon State of the Union: Focusing on Use Cases

Posted under: Research and Analysis As we revisited the Security Monitoring Team of Rivals, it’s obvious that the overlap between SIEM and security analytics is past the point of no return. Thus with a Civil War brewing, the key goal is to determine what will be your strategic platform for ... Read More

The Security Profession Needs to Adopt Just Culture

Posted under: Research and Analysis Yesterday Twitter revealed they had accidentally stored plain-text passwords in some log files. There was no indication the data was accessed and users were warned to update their passwords. There was no known breach, but Twitter went public anyway, and was excoriated in the press ... Read More

SecMon State of the Union: Revisiting the Team of Rivals

Posted under: Research and Analysis Things change. That’s the only certainty in technology today, and certainly in security. Back when we wrote Security Analytics Team of Rivals, SIEM and Security Analytics offerings were different and not really overlapping. It was more about how can they coexist, as opposed to choosing ... Read More

Complete Guide to Enterprise Container Security *New Paper*

Posted under: Research and Analysis The explosive growth of containers is not surprising because the technology (most obviously Docker) alleviates several problems for deploying applications. Developers need simple packaging, rapid deployment, reduced environmental dependencies, support for micro-services, generalized management, and horizontal scalability – all of which containers help provide. When ... Read More
Firestarter-3-19

Firestarter: Auditors, Assessors, and Cloud.. Oh My!

Posted under: Firestarter This week the gang discusses Rich’s recent discussions with some clients struggling to deal with auditors and assessors who don’t really understand cloud computing. Watch or listen: - Rich (0) Comments Subscribe to our daily email digest ... Read More
Loading...