Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
Business risk, the cyber supply chain, attackers, data security and awareness training top the list
Endpoint security vendors must be a one-stop endpoint security shop -- providing such things as anti-malware, anti-exploit, EDR and hybrid deployment options -- if they want to compete.
Infosec professionals face occupational hazards such as long hours, high stress levels, and career frustration that can lead to mental health issues.
Cloud and mobility are exacerbating problems in an already-fragile IAM infrastructure. This will drive changes to single sign-on, multi-factor authentication, IAM centralization, and skills.
Organizations want to merge threat intelligence with internal security telemetry, add custom functionality for security operations, and automate remediation tasks.
AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.
Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.
New data reveals growing skills gaps that represent an existential threat. What should organizations do?
Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.
Leading vendors are putting together proprietary SOAPA solutions. CISOs should establish an evaluation team tasked with looking for viable options.
Aside from earning more money, CISOs pursue other opportunities when current employers minimize cybersecurity commitments and efforts.
Security leaders must move closer to the business, improve staff productivity and modernize security technology infrastructure.
Organizations will continue to embrace the NIST cybersecurity framework, bolster training, and increase budgets.
Look for cloud computing chaos, high-end services, technology consolidation/integration, machine learning ubiquity, and a GDPR mess.
To keep the information security team happy, organizations must offer competitive compensation, career advancement and a commitment to strong security.
New advanced protection technologies will help organizations decrease the attack surface and simplify security operations.
While information security professionals agree that continuous training is important, they are too busy to keep up.
In 2018, leading organizations will adopt new technologies to help them decrease the attack surface and block attacks in real time.
Because of the global cybersecurity skills shortage, nearly half of all cybersecurity professionals are solicited to consider other jobs at least once per week.
No one owns identity at many organizations and identity skills are lacking. In lieu of a solution, these issues could lead to IoT roadblocks and security vulnerabilities.
New research from ESG and ISSA reveals that a lack of training, inadequate cybersecurity staffing, and business apathy contribute to security events.
Security analysts/investigators, application security specialists, and cloud security skills top a long list of skills deficits.
ESG research with ISSA shows that organizations don’t have the right levels of cybersecurity personnel, skills and ongoing training to keep up with cyber risk.
Large organizations are understaffed and lack the right skills for things such as threat hunting, prioritizing alerts, and forensic investigations.
Large organizations want to monitor user activities, move to multi-factor authentication, and get security more involved with IAM decisions.
Enterprise organizations want new endpoint security tools that prevent exploits and malware better and streamline operations.
New demands for scale, security and machine learning will support massive proliferation of internet-connected devices.
Traditional and next-generation vendors offer suites for endpoint protection, detection and response. But what’s needed, and will customers buy?
Start by automating simple security operations tasks and then proceed with re-engineering and orchestrating processes.
National Cybersecurity Awareness Month has failed to gain national, industry or cybersecurity community attention. It’s time to rally around it or kill it.
Trend Micro has the products, ecosystem and strategy to become an enterprise security leader. Now it needs to improve market visibility and get on CISOs’ radar.
Security operations and analytics platform architecture could accelerate technology innovation, ease integration, and enhance the value of existing technologies.
Hype, confusion and technobabble hinder cybersecurity purchasing decisions and ongoing operations.
Changing requirements and constant innovations are making security technology options more confusing.
Amid the user excitement, Splunk made several enterprise security announcements at its annual user conference.
Cybersecurity professionals should abandon their control freak persona, as a cloud-based security management plane offers many attractive benefits.
Security telemetry is on the rise, but gaining insight and operationalizing the data remains challenging and many organizations are falling behind.
Enterprise organizations tend to follow a standard sequence as they secure cloud-based workloads and integrate cloud and existing security controls.
Organizations will spend more on security operations, but CISOs need metrics to demonstrate ROI.
Business managers are engaged, but security operations remain informal, limited and anchored by key personnel.
Mike Banic, Vectra Networks' vice president of marketing, discusses SOAPA's effect on cybersecurity, including data collection, technology integration and machine learning.
VMware's AppDefense combines least privilege with automation, orchestration and machine learning to help improve application security.
Cybersecurity professionals admit it takes too long and costs too much to detect and respond to security incidents.
To be an enterprise-class cybersecurity vendor, it takes industry, business process and operations expertise. But they must also demonstrate “soft power” to the market.
Cisco, IBM, Symantec and McAfee lead the cybersecurity vendors in mind share, but the race has just begun.
The ability to detect and respond to threats is greatly impeded by a lack of cybersecurity skills and staff. Leading organizations offer a few suggestions.
Many organizations struggle with processes, tools and the working relationship between security and IT operations teams.
Cybersecurity professionals see potential in machine learning, but they need education and guidance.
Black Hat 2017 was a busy show, highlighting a healthy cybersecurity industry. But there was too much hype, misunderstanding, and proprietary agendas.
Security staff and skills deficits lead to weaknesses in areas such as threat hunting, prioritizing security alerts, and computer forensics.