Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform.
New research from ESG and ISSA illustrates a lack of advancement in bridging the cybersecurity skill shortage gap.
New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.
SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA).
Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.
More security data drives the need for data modeling, data management, and data discipline
Organizations want advanced analytics, threat intelligence integration, and IoT support among other things in network traffic analysis (NTA) tools.
To bridge the cyber-risk management gap, organizations plan to get CISOs more involved with the business, focus on data security, hire staff, and provide more security awareness training.
Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before.
Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs.
Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead.
Keeping up with IT, educating users, and working with the business top the list of the most stressful things of being a cybersecurity professional.
In the battle against hackers, cyber-adversaries have an advantage over cyber-defenders, new research from ESG and ISSA finds.
New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread.
Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.
Threat detection/response is a high priority, but many organizations don’t have the staff or skills to perform these tasks alone. This translates into a growing managed detection and response (MDR) market.
Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.
Prioritizing fixes, workflows, and timely patching are just some of the challenges organizations face, but advanced data analytics may help with vulnerability management.
Organizations struggle with continuous monitoring, tracking the threat landscape, identifying sensitive data flows, and communication between cybersecurity and business executives.
Business managers want real-time cyber risk management metrics, but cybersecurity teams can only deliver technical data and periodic reports. That gap needs to close.