Fresh off a week at the Splunk conference (called .conf24), I want to share a few insights about my time at the show.
Chris Steffen
Recent Posts
Review of the 2024 Splunk Conference (or – is Cisco going to mess up Splunk)
By Chris Steffen on Jun 18, 2024 10:56:19 AM
RSA Conference Recap
By Chris Steffen on May 21, 2024 8:56:01 AM
Another RSA conference (not RSA, not #RSA, but “THE RSA Conference” – those that bought the conference do not want it to be associated with RSA the company, which leads me to wonder why they didn’t just rename the thing to something else more securityish) is in the books, and I thought I would share a few thoughts about things I saw and vendors that I met with at the conference.
From AI to Zero Trust: Decoding Cybersecurity Trends for 2024
By Chris Steffen on Dec 22, 2023 4:09:04 PM
In 2024, we will continue to see globally significant advancements in information security and regulatory compliance spending for organizations of all sizes. From zero trust architecture to the integration of AI-driven solutions and the growing emphasis on regulatory alignment, 2024 will redefine how organizations safeguard sensitive information, navigate compliance complexities, and fortify their API ecosystems. Understanding and adapting to these transformative trends will be pivotal for businesses aiming to stay resilient, secure, and compliant in a time noted for rapid technological advancements and stringent regulatory landscapes. Here are our predictions for information security in 2024.
Star Wars Day – How Security Failures Led to the Empire’s Downfall
By Chris Steffen on May 4, 2023 9:58:11 AM
To celebrate Star Wars Day, I thought I would share a few ways in which the Empire did not adhere to information security best practices, and that enabled the Rebels to win.
To be clear: I do not support the Empire, the Sith Lords, or any other types of scum and villainy. Nor am I trying to portray the Rebel Alliance as a weird, Force-wielding, Galactic hacker consortium or something. But had the Empire not been so lax in their security controls, Emperor Palpatine and his buddies might have been able to bring their “order and peace” to the galaxy.
The Harsh Truth About Layoffs in the Tech Industry
By Chris Steffen on Feb 14, 2023 10:48:37 AM
Seemingly every day, we hear about the next batch of layoffs from the household-name tech companies: 10,000 here, 1,700 there. As we continue into earning seasons for these publicly traded (and some not publicly traded) companies, we will likely hear more. The substory is that unemployment is at an all-time low, with the job market adding over 500,000 jobs in January.
Cybersecurity Asset Management for Vulnerability Management: Key Capabilities, Benefits
By Chris Steffen on Feb 28, 2022 8:46:39 AM
This is the last in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management and Part 2 focused on how a cybersecurity asset management solution improves an organization’s vulnerability management program. Part 3 of the series provides a brief summary and some perspectives on the benefits of a cybersecurity asset management solution as it relates to vulnerability management.
Improving Vulnerability Management With Cybersecurity Asset Management
By Chris Steffen on Feb 17, 2022 10:08:25 AM
This is the second in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management. Part 2 of the series focuses on how a cybersecurity asset management solution improves an organization’s vulnerability management program.
Simplify Vulnerability Management With Cybersecurity Asset Management
By Chris Steffen on Feb 10, 2022 9:41:39 AM
This is the first in a three-part blog series by Enterprise Management Associates (EMA) for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. Part one of the series focuses on defining the cybersecurity asset management solutions category and includes a summary definition of vulnerability management.
Data Security in a Multi-Cloud World...
By Chris Steffen on Jul 22, 2021 8:24:36 AM
F5 / AWS Integration Podcast...
By Chris Steffen on Oct 20, 2020 9:35:31 AM
I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS).