Graphiant: A Vendor to Watch

By Shamus McGillicuddy on Sep 8, 2022 12:16:28 PM

The WAN edge is becoming more distributed and dynamic, which is overburdening IT organizations that are already at a breaking point. Software-defined WAN technology has solved some of the issue, but they haven’t gone far enough. The cloud, the Internet of Things (IoT), and the work-from-home (WFH) revolution demand something more.

Continue Reading

RSAC 2022 Closing Thoughts - Return of Cybersecurity Conferences to the Wild, Wild West Coast

By Ken Buckler on Jun 16, 2022 9:43:34 AM

It’s time to circle the wagons and defend the data and users

As the world reopens, the conference booths light with excitement and empty expo halls are once again filled with hustle and bustle. I thought it important to take a moment and look at what changed in the past two years and where the security industry has room for improvement. This was the first in-person RSA Conference, and likely the first major security conference at all for that matter, with large in-person attendance after the peak of the COVID-19 pandemic. While the conference looks very similar to conferences before the pandemic, the cybersecurity industry landscape has drastically changed.

Continue Reading

Reflection on Informatica World 2022

By Will Schoeppner on Jun 9, 2022 3:45:15 PM

Recently, I had the opportunity to attend Informatica World 2022 (IW22) in Las Vegas. Returning to the in-person conference scene caused some apprehension; however, reflecting on takeaways and engaging in discussions around data integration made this trip a worthwhile experience. I want to thank IW22 for a thought-provoking week of discussions centered on data management, data integration, interoperability, artificial intelligence, and navigating a complex, hybrid, multi-cloud digital environment with Informatica experts, sponsors, and customers.

Continue Reading

Intelligent Mice, Intelligent Mouse Traps – The Future of Cybersecurity and AI

By Ken Buckler on May 31, 2022 6:27:37 AM

Long gone are the days of simple, signature-based defenses against cyber-threats.

Cyber-threats are growing at an exponential rate in the perpetual cat-and-mouse game of cybersecurity, and traditional approaches to cybersecurity are struggling to keep pace. In 2021, anti-malware vendors estimated that they detected between 300,000 and 500,000 new pieces of malware every day. That means than in 2021 alone, over 100 million new pieces of malware were created. Even if cybersecurity vendors can keep up with the sheer volume of new pieces of malware, traditional signature-based and even heuristic-based detection algorithms will struggle to keep up – and that’s only for known malware.

Continue Reading

How to Identify the Ideal Network Automation Solution

By Shamus McGillicuddy on Apr 27, 2022 9:00:18 AM

Data center network automation delivers four primary benefits to a business, according to Enterprise Management Associates research: operational efficiency, reduced security risk, improved compliance, and network agility.

Continue Reading

Not so Quiet on the Cyber Front: Why Your Organization is Still a Target

By Ken Buckler on Mar 4, 2022 2:27:34 PM

It's been quite an interesting couple of weeks. What started off with rising tensions as Russia amassed troops at the Ukraine border evolved into a full invasion of the country. Our newsfeeds are filled with stories and images of ace fighter pilots, brave soldiers making their final stands, and farmers stealing Russian tanks by hooking them up to farm equipment – but another battle has been taking place behind the scenes for many years.

Continue Reading

Cybersecurity Asset Management for Vulnerability Management: Key Capabilities, Benefits

By Chris Steffen on Feb 28, 2022 8:46:39 AM

This is the last in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management and Part 2  focused on how a cybersecurity asset management solution improves an organization’s vulnerability management program. Part 3 of the series provides a brief summary and some perspectives on the benefits of a cybersecurity asset management solution as it relates to vulnerability management.

Continue Reading

Accelerate Network Automation by Pivoting From Homegrown to Commercial Software

By Shamus McGillicuddy on Feb 24, 2022 8:11:24 AM

Sponsored post for Gluware

Continue Reading

Improving Vulnerability Management With Cybersecurity Asset Management

By Chris Steffen on Feb 17, 2022 10:08:25 AM

This is the second in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management. Part 2 of the series focuses on how a cybersecurity asset management solution improves an organization’s vulnerability management program.

Continue Reading

Simplify Vulnerability Management With Cybersecurity Asset Management

By Chris Steffen on Feb 10, 2022 9:41:39 AM

This is the first in a three-part blog series by Enterprise Management Associates (EMA) for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. Part one of the series focuses on defining the cybersecurity asset management solutions category and includes a summary definition of vulnerability management.

Continue Reading

    Lists by Topic

    see all

    Posts by Topic

    see all

    Recent Posts