In today’s rapidly evolving digital landscape, managing IP infrastructure has become increasingly complex and critical for organizations of all sizes. As…
Read MoreResearch
The Impact of GenAI on Data Loss Prevention
Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but…
Read MoreIdentity, Endpoint, and Network Security Walk into a Bar
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally…
Read MoreSidecarless Service Meshes: Are They Ready for Prime Time?
Service meshes have become a cornerstone in the architecture of modern microservices, providing a dedicated infrastructure layer to manage service-to-service communication.…
Read MoreDigital Experience Platforms: Transforming Marketing in the 21st Century
In today’s fast-paced digital landscape, creating engaging and personalized customer experiences is paramount to business success. Enter digital experience platforms (DXPs)—powerful…
Read More“Gone Phishing”—Every Cyberattacker’s Favorite Phrase
Phishing—how old hat is that as a topic? Isn’t it solved for most of us by now? Can’t we speak about…
Read MoreBackup to the Future!
“I finally invented something that works!” This iconic quote from Back to the Future perfectly encapsulates the transformative journey of cloud-native…
Read MoreGetting Started with Hybrid Cloud Data Protection
In today’s fast-paced digital world, protecting your data isn’t just a technical necessity—it’s a long-term strategy for operational sustainability. As businesses…
Read MoreSecurity Policy as Code: An Architect’s Perspective on the Evolving Landscape
I have always been intrigued by how security marries automation in infrastructure. Defining and managing security policies as code in what…
Read MoreHow ITIL’s Ownership Transition Impacts the ITSM Market
The ownership of the information technology infrastructure library (ITIL) has changed. As a result, the information technology service management (ITSM) market’s…
Read More5 Questions for Carsten Brinkschulte, CEO Dryad: Silvanet, early warning for forest fires
I spoke recently with Carsten Brinkschulte, co-founder and CEO of Dryad. Here is some of our conversation on Silvanet and how…
Read MoreThe Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis
In the ever-evolving cyberthreat landscape, cybercriminals are deploying sophisticated methods to exploit network vulnerabilities while organizations constantly seek new ways to…
Read MoreEmbracing the Future: A Vision for the CASB Market
As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB)…
Read MoreAre We Taking Enterprise Password Management Seriously?
Passwords are the keys to your digital assets: it’s how we access applications and data, as well as infrastructure and systems.…
Read MoreEdge Orchestration Platforms: Navigating the Next Wave of Innovation
In an era where digital transformation is not just a buzzword but a business imperative, edge orchestration platforms are emerging as…
Read MoreThe Future of ZTNA: A Convergence of Network Access Solutions
Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data…
Read MoreSaaS Security Posture—It’s not you, it’s me!
In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure,…
Read MoreNavigating the Unique Landscape of OT Security Solutions
Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements…
Read MoreThe Rapidly Changing Landscape of Enterprise Object Storage
For a long time, enterprise object storage was positioned for archive and backup workloads—hardly the most exciting task, yet certainly a…
Read MoreSaaS Management and Application Discovery
The old saying, “history doesn’t repeat itself, but it often rhymes,” proves itself time and again with computers. In my recent…
Read MoreOperations Leadership Lessons from the Crowdstrike Incident
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past…
Read MoreWhy isn’t “Just SIEM” Enough?
There’s a legacy connotation attached to SIEM that has led to vendors advertising themselves as some iteration of a next-generation solution.…
Read MoreWhat Makes Something Edge Native?
In simplistic definitions, the edge is characterized as simply moving workloads closer to end users to reduce network latency associated with…
Read MoreNavigating the CrowdStrike Outage: Insights from a Tech Industry Veteran
As a seasoned CIO/CISO and tech industry analyst with 35 years of experience, I’ve seen my fair share of cybersecurity incidents.…
Read More