Immigrants and Billionaires: Why are We Blaming Them?
The blame game is a tricky effort these days. Maybe its part of the problem, not the solution. I cringed at many of the comments made across this year’s political theater. It ...
“Quantum Matter” Anyone?
Eerie discoveries in thin substance research fuel speculation about what comes after silicon and oil. Is free energy around the corner? Last year a highly respected technologist (and friend) told me “free ...
New Perspectives on Cloud Security: An Interview with Gururaj Pandurangi
The Capital One breach last year was significant on multiple fronts. A trusted financial services brand on a leading cloud IaaS environment was easily breached, to the tune of 10M records compromised ...
Let’s Change the World
Thank you for the responses to the first “Three Questions” blog! Do you know of a company that’s helping to accelerate the future by closing the gap between dynamic infrastructure and static ...
New Perspectives on SD-WAN: An Interview with Stefano Gridelli
SD-WAN deployment has accelerated in recent years as organizations extend SDN benefits across wide area networks. It’s a pretty transformative process, producing new management and cost benefits along with new user experience ...
As We Enter Another Cyber Year of Living Dangerously
Within the next ten years half of today’s network security leaders will be either: 1) replaced by a new generation of leaders built upon advanced architectures; or 2) will have acquired new ...
The Firewall Chasm is…
Network Effects are Powerful Since the early days of TCP/IP, connectivity has created waves of multi-billion-dollar markets, seemingly out of thin air. All of the successes have had one thing in common: ...
The Digital Age Maginot Line as Foreseen by Mel Brooks
Attack Vectors in the… Trillions? The growing attack surface of the new industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” ...
The Digital Cyber Security Paradox
Everything is Connected In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a ...
IIoT: Apocalypse Now or Later
The IIoT problem no one has been talking about, despite high profile attacks: “The hyper-converged infrastructures we’re building because of overwhelming business advantage is putting us at an overwhelming cybersecurity disadvantage.” – ...