Tag Archives: technology

My latest Gartner Research: SWOT: Palo Alto Networks, Network Security, Worldwide

While growing commoditization and execution issues led to some sustainable growth setbacks in 2016, Palo Alto Networks is well-placed to become the largest firewall provider. Technology product management leaders should further strengthen management capabilities and prioritize firmware releases….

Gartner clients can read this research by clicking here.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Competitive Landscape: Threat Intelligence Services, Worldwide, 2017

26 July 2017  |  Technology product management leaders must focus on demonstrating how products and services bring relevancy and actionability in order to better succeed in a highly fragmented and increasingly competitive marketplace….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research: Market Opportunity Map: Security and Risk Management Software, Worldwide

20 April 2017  |  The security software market is transforming through four vectors: analytics, adoption of SaaS and managed services, expanded ecosystems, and regulations. Technology business unit leaders must realign their product and go-to-market strategies to address these key forces….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research: Forecast Analysis: Information Security, Worldwide, 4Q16 Update

11 April 2017  |  The overall global information security market is forecast to grow at a compound annual growth rate of 7.8% through 2020. This document, aimed at technology strategic planners, discusses the key highlights and associated assumptions for the fourth-quarter forecast….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Cool Vendors in Security for Technology and Service Providers, 2016

The boundaries of information security are fast expanding. These Cool Vendors are pioneering new directions and potential opportunities in the security market. TSP product managers and CMOs looking to partner with these vendors should examine their innovative security technologies.

Gartner customers can read this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Hacking Critical Infrastructure: A How-To Guide

http://www.defenseone.com/technology/2015/07/hack-critical-infrastructure/118756/ By Patrick Tucker Defense One July 31, 2015 Cyber-aided physical attacks on power plants and the like are a growing concern. A pair of experts is set to reveal how to pull them off — and how to defend against them. How easy would it be to pull off a catastrophic cyber attack on, say, a nuclear power plant? At next week’s Black Hat and Def Con cybersecurity conferences, two security consultants will describe how bits might be used to disrupt physical infrastructure. U.S. Cyber Command officials say this is the threat that most deeply concerns them, according to a recent Government Accountability Office report. “This is because a cyber-physical incident could result in a loss of utility service or the catastrophic destruction of utility infrastructure, such as an explosion,” the report said. The most famous such attack is the 2010 Stuxnet worm, which damaged centrifuges at Iran’s Natanz nuclear enrichment plant. (It’s never been positively attributed to anyone, but common suspicion holds that it was the United States, possibly with Israel.) Scheduled to speak at the Las Vegas conferences are Jason Larsen, a principal security consultant with the firm IOActive, and Marina Krotofil, a security consultant at the European Network for Cyber Security. Larsen and Krotofil didn’t necessarily hack power plants to prove the exploits work; instead Krotofil has developed a model that can be used to simulate power plant attacks. It’s so credible that NIST uses it to find weakness in systems. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Federal Employee May Have Been Cooking Meth at Government Agency’s Campus

http://www.govexec.com/oversight/2015/07/fbi-and-congress-are-investigating-if-meth-lab-exploded-federal-building/118751/ By Eric Katz Govexec.com July 30, 2015 A federal employee may have recently learned the hard way that cooking meth should be left to the chemistry experts. The FBI and a congressional committee are investigating whether a federal worker was manufacturing methamphetamine in a federal building after a room exploded earlier this month. After a July 18 explosion at a building at the National Institute of Standards and Technology’s Gaithersburg, Md., campus, authorities found many of the key ingredients for making meth and a recipe for the drug, according to News4, the NBC’s Washington, D.C., affiliate. The House Science, Space and Technology Committee is looking into whether a federal police lieutenant who was injured in the blast was involved in cooking the meth. The lieutenant resigned from NIST last week, according to The Washington Post. The officer originally told authorities the blast occurred after trying to refill a butane lighter. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Survey: Nearly 1 in 4 IT firms suffered security breach

http://www.crainsdetroit.com/article/20150726/NEWS/307269992/survey-nearly-1-in-4-it-firms-suffered-security-breach By TOM HENDERSON Crain’s Detroit Business July 26, 2015 Twenty-three percent of executives at technology companies say their firms have suffered a security breach in the past 12 months, according to the national annual Technology Industry Business Outlook survey conducted by KPMG LLP, the audit, tax and advisory firm. Three-fourths of executives surveyed say their companies will spend between 1 percent and 5 percent of annual revenue on IT security in the next 12 months. “The survey findings on security are an important marker, since tech companies are the pacesetters in IT security. How much and where tech companies spend on IT security, and how successful they are, can serve as guides for all other industries,” Gary Matuszak, global chairman of KPMG’s technology, media and telecommunications practice, said in a release. The KPMG survey was of upper managers at 111 U.S.-based technology companies. Of the respondents, 54 percent were in companies with revenue of more than $1 billion a year, with the rest at companies with annual revenue between $100 million and $1 billion. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail