Selecting Enterprise Email Security: Detection Matters

Posted under: Research and Analysis As we covered in the introduction to the Selecting Enterprise Email Security series, even after over a decade of trying to address the issue, email-borne attacks are still a scourge on pretty much every enterprise. That doesn’t mean that the industry hasn’t made progress, it’s ... Read More

Selecting Enterprise Email Security: Introduction

Posted under: Research and Analysis It’s 2019, and we’re revisiting email security. Wait; what? Did we step out of the time machine and end up in 2006? Don’t worry; you didn’t lose the past 13 years in a cloud of malware (do you see what we did there?). But before ... Read More
The ELEVENTH Annual Disaster Recovery Breakfast: Is that you Caesar?

The ELEVENTH Annual Disaster Recovery Breakfast: Is that you Caesar?

|
Posted under: General Things have been good in security. Really good. For a really long time. We can remember when there were a couple hundred people that showed up for the RSA Conference. Then a couple thousand. Now over 40,000 people descend on San Francisco to check out this security ... Read More

Quick Wins with Data Guardrails and Behavioral Analytics

|
Posted under: Research and Analysis This is the third (and final) post in our series on Protecting What Matters: Introducing Data Guardrails and Behavioral Analytics. Our first post, Introducing Data Guardrails and Behavioral Analytics: Understand the Mission we introduced the concepts and outlined the major categories of insider risk. In ... Read More

Protecting What Matters: Defining Data Guardrails and Behavioral Analytics

|
Posted under: General Title: Protecting What Matters: Defining Data Guardrails and Behavioral Analytics This is the second post in our series on Protecting What Matters: Introducing Data Guardrails and Behavioral Analytics. Our first post, Introducing Data Guardrails and Behavioral Analytics: Understand the Mission we introduced the concepts and outlined the ... Read More

Building a Multi-cloud Logging Strategy: Issues and Pitfalls

|
Posted under: Heavy Research As we begin our series on Multi-cloud logging, we will start with why some of the traditional approaches to logging won’t work. I generally don’t like to start on a negative tone, but we think it is import to point out some of the challenges and ... Read More

DAM Not Moving to the Cloud

|
Posted under: Incite I’ve come to the conclusion that nobody is using Database Activity Monitoring (DAM) in public Infrastructure or Platform as a Service. I never see it in any of the cloud migrations we assist with. Clients don’t ask about how to deploy it or if they need to ... Read More

Cloudera and Hortonworks Merge

|
Posted under: News I’ve been planning to do a blog post on the recent announcement of the planned merger between Hortonworks and Cloudera, as there area number of trends I’ve been witnessing with the adoption of Hadoop clusters, and this merger I feel reflects them in a nutshell. But catching ... Read More
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013

Building a Multi-cloud Logging Strategy: Introduction

|
Posted under: Heavy Research Logging and monitoring for cloud infrastructure has become the top question we are being asked. Even general conversations about moving applications to the cloud always seem to end up with clients asking how to ‘do’ logging and monitoring of cloud infrastructure. Logs are key for security ... Read More

Introducing Data Guardrails and Behavioral Analytics: Understand the Mission

|
Posted under: Research and Analysis After over 25 years of the modern IT security industry, breaches still happen at an alarming rate. Yes, that’s pretty obvious, but clearly disappointing given the billions spent every year to remedy the situation. Over the past decade, the mainstays of security controls have undergone ... Read More
Loading...