ESG’s research indicates that network security spending will be a focus area for 2010. Nearly half (48%) of midsized (less than 1,000 employees) and enterprise (more than 1,000 employees) organizations will invest in network security technologies like firewalls, IDS/IPS, gateways, and threat management solutions. Yes, all of these technologies are important components [...]
While we in Boston had very little natural snow, Washington DC had a record year. Three storms dropped 32″ of snow on our nation’s capital. This led to a federal government shutdown for 3 days–costing an estimated $100 million per day. You’d think that the impact of this shutdown would be addressed somewhat by the fed’s [...]
Last week, Google announced that it will support OpenID as a Single Sign-On (SSO) and identity standard in its Apps Marketplace. For the most part, this announcement flew under the radar of most people but it may be far more significant than a simple technology integration play for several reasons:
OpenID is an industry [...]
With the tremendous growth in malware, identity theft, and online scams, you’d think that every PC owner in the world would make Internet security software a “must have” before connecting to the Internet. Unfortunately, this assumption is dead wrong. Believe it or not, lots of industry research indicates two huge misconceptions [...]
Last week, I wrote a blog suggesting that IT professionals and legislators read the new book, “Fatal System Error,” by Joseph Menn. This recommendation was based on my belief that most people don’t understand the scope of sophistication of current cyber threats and that we need more government and private sector [...]
It is easy to become cynical around all the Cloud Computing hype we hear on a daily basis. That said, it is clear to me that there is a tremendous amount of capital and human resources working on cloud computing so the likelihood of future cloud computing success is quite high. Case in [...]
Cisco is getting a lot of flack for billing its announcement yesterday as something that will “change the Internet forever.” I certainly understand this sentiment–will a new high-end core router, albeit with very impressive performance ratings, really change the Internet forever? The answer is pretty simple: the router alone won’t change the Internet, [...]
Two stories caught my eye yesterday. First, a company named Newegg shipped counterfeit Intel i7 chips to customers. Customers received a clay mold and piece of scrap metal rather than a real processor. Intel and others are investigating this situation. In another story, the Energizer Duo Charger, a laptop battery charger kit made of up [...]
When I left home for the RSA Conference last Monday, I was already aware of the types of cyber threats we are up against. After speaking with security research leaders from Bluecoat, Symantec, and Trend at RSA, I am even more convinced that we are way behind the enemy and need to [...]
It’s pouring in San Francisco, but ironically, the RSA Conference is already pointed toward clouds–in this, case cloud computing security. There were two announcements yesterday around securing private clouds. New initiative king Cisco announced its “Secure Borderless Network Architecture,” which is actually pretty interesting. Cisco wants to unite applications and mobile devices [...]
Your email: