Cybersecurity
March 25, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, IT Pruning, Q&As ||
At this year’s RSA conference, Early Adopter Research’s Dan Woods sat down for a podcast conversation with Michael Covington, VP of product strategy for Wandera. They discussed a number of topics, including an overview of what Wandera does. Woods also asked Covington about his three key cybersecurity questions for 2019. This is an edited version […]
Tags: cybersecurity, rsa, wandera, zero trust
Read more
March 22, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, External Data, IT Pruning, Podcasts ||
At this year’s RSA conference, Early Adopter Research’s Dan Woods sat down for a podcast conversation with Michael Covington, VP of product strategy for Wandera. They discussed a number of topics, including an overview of what Wandera does. Woods also asked Covington about his three key cybersecurity questions for 2019. Their conversation also covered: * […]
Tags: cybersecurity, rsa, wandera, zero trust
Read more
March 21, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, Q&As ||
At this year’s RSA Conference, Early Adopter Research’s Dan Woods conducted a podcast with Stan Lowe from Zscaler. Lowe is the Global CISO for Zscaler and their conversation covered three big questions about cybersecurity in 2019. This is an edited version of their conversation that you can listen to in full on the podcast. Woods: […]
Read more
March 20, 2019 || by Jennifer Walker || Blogs & Articles, Cloud, Cybersecurity, Podcasts ||
At this year’s RSA Conference, Early Adopter Research’s Dan Woods conducted a podcast with Stan Lowe from Zscaler. Lowe is the Global CISO for Zscaler and their conversation covered three big questions about cybersecurity in 2019. Topics covered in the podcast include: * 3:15 – Is “zero trust” cybersecurity a reality? * 9:00 – Can […]
Tags: cybersecurity, zscaler
Read more
February 20, 2019 || by Jennifer Walker || AI, Blogs & Articles, Cybersecurity ||
This is the second in a series of pieces that address crucial questions in cybersecurity that I spoke to with industry leaders during the RSA 2018 Conference and updated with new ideas in the run-up to RSA 2019 in San Francisco. These questions built on my previous work, in which I’ve written about the need […]
Tags: AI, cybersecurity, data integration, rsa
Read more
June 13, 2018 || by Dan Woods || Blogs & Articles, Cybersecurity ||
The patterns of cyber attacks are well known and so are the targets. The bad guys are seeking to break in to get valuable data or take actions that benefit them, and want to go undetected for as long as possible. There are a number of solutions out there dedicated to prevention, system lock-down, prevention […]
Tags: cybersecurity, deceptions, decoy
Read more
February 2, 2018 || by Dan Woods || Blogs & Articles, Cybersecurity, Data Lake, Infographics ||
Companies need to guard against cyber threats. But how? This infographic examines the six essential features of cybersecurity, and how each one functions to keep your business secure.
Read more
December 6, 2017 || by Dan Woods || Blogs & Articles, Cybersecurity, IT Management ||
The challenge of cybersecurity is as much economic as it is technological. The fact is no matter what the size of a company no amount of spending will provide complete safety. The crucial questions for Google, Facebook, IBM or your company are the same: What assets are we trying to protect? How much can we […]
Read more
December 6, 2017 || by Dan Woods || Blogs & Articles, Cybersecurity, IT Management ||
In the past year or so, I’ve been looking at all sorts of technology related to cybersecurity. Compared to most domains of IT, cybersecurity is a jungle of overlapping offerings. It is not easy to understand each product or how many products one might need. To help sort things out in my mind, I’ve developed […]
Read more