Cybersecurity
March 25, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, IT Pruning, Q&As ||
At this year’s RSA conference, Early Adopter Research’s Dan Woods sat down for a podcast conversation with Michael Covington, VP of product strategy for Wandera. They discussed a number of […]
Tags: cybersecurity, rsa, wandera, zero trust
Read more
March 22, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, External Data, IT Pruning, Podcasts ||
At this year’s RSA conference, Early Adopter Research’s Dan Woods sat down for a podcast conversation with Michael Covington, VP of product strategy for Wandera. They discussed a number of […]
Tags: cybersecurity, rsa, wandera, zero trust
Read more
March 21, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, Q&As ||
At this year’s RSA Conference, Early Adopter Research’s Dan Woods conducted a podcast with Stan Lowe from Zscaler. Lowe is the Global CISO for Zscaler and their conversation covered three […]
Read more
March 20, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, Podcasts ||
At this year’s RSA Conference, Early Adopter Research’s Dan Woods conducted a podcast with Stan Lowe from Zscaler. Lowe is the Global CISO for Zscaler and their conversation covered three […]
Tags: cybersecurity, zscaler
Read more
February 20, 2019 || by Jennifer Walker || AI, Blogs & Articles, Cybersecurity ||
This is the second in a series of pieces that address crucial questions in cybersecurity that I spoke to with industry leaders during the RSA 2018 Conference and updated with […]
Tags: AI, cybersecurity, data integration, rsa
Read more
June 13, 2018 || by Dan Woods || Blogs & Articles, Cybersecurity ||
The patterns of cyber attacks are well known and so are the targets. The bad guys are seeking to break in to get valuable data or take actions that benefit […]
Tags: cybersecurity, deceptions, decoy
Read more
February 2, 2018 || by Dan Woods || Blogs & Articles, Cybersecurity, Data Lake, Infographics ||
Companies need to guard against cyber threats. But how? This infographic examines the six essential features of cybersecurity, and how each one functions to keep your business secure.
Read more
December 6, 2017 || by Dan Woods || Blogs & Articles, Cybersecurity, IT Management ||
The challenge of cybersecurity is as much economic as it is technological. The fact is no matter what the size of a company no amount of spending will provide complete […]
Read more
December 6, 2017 || by Dan Woods || Blogs & Articles, Cybersecurity, IT Management ||
In the past year or so, I’ve been looking at all sorts of technology related to cybersecurity. Compared to most domains of IT, cybersecurity is a jungle of overlapping offerings. […]
Read more