Cyber Threat Hunting: Step-by-Step Guide and Best Practices

Cyber threat hunting is a proactive method for tracking down and remediating advanced threats that evade traditional detection measures. Unlike...

Top Use Cases for Threat Intelligence

Threat Intelligence Platforms (TIPs) help organizations quickly understand, anticipate, and mitigate threats. With cyberattacks becoming far more frequent, subtle, and sophisticated...

The Intersection of SecOps and ITOps: The New BFFs

The holy grail of operational excellence requires the seamless integration of two critical domains: security operations (SecOps) and IT operations...

Outpacing Modern Threats with Immediate Security Analytics

The motto for today’s cybersecurity teams should be “Blink, and you’ll miss it.” A robust defense requires analyzing the immense...

Understanding SIEM and XDR: A Comprehensive Comparison for Security Operations Centers

Cybersecurity teams, regardless of the size of their business or the industry they work in, face a relentless and increasing...

The MITRE ATT&CK Framework: A Deep Dive into Its Development, Applications, and Future Evolution

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework has become a cornerstone of modern cybersecurity. Since its inception, ATT&CK has...

How AI is Driving the Evolution of Threat Intelligence

The widespread use of generative AI (GenAI) is transforming the field of threat intelligence, significantly accelerating capabilities for data analysis...

Leveraging Data Enrichment in Cyber Threat Intelligence

Cyber Threat Intelligence (CTI) is a critical component of any cybersecurity strategy. It helps security teams identify, analyze, and mitigate...

An Overview of Query Languages Used in Cybersecurity and SIEM

Query languages play an essential role in threat detection, incident response, and overall cybersecurity management. Security professionals use them to...

A Deep Dive into Different Types of Threat Intelligence

Threat intelligence is the lifeblood of cybersecurity, keeping your organization abreast of emerging threats, vulnerabilities, and exploits. However, not all...

Understanding the Differences and Similarities Between SIEM and SOAR

Security information and event management (SIEM) and security orchestration, automation, and response (SOAR) are two long-standing, critical technologies that play...

Top Three Cybersecurity Concerns and What to Do About Them

Chief Information Security Officers (CISOs) have a particularly tough challenge. No one notices if they do their jobs perfectly—because nothing...

Dealing with Security Threats at Scale

Picture a major government agency responsible for overseeing several major health insurance programs that service over a hundred million customers...

Top 10 Cybersecurity Trends and What You Need to Do about Them Now

Cybersecurity is arguably the most challenging and dynamic domain within the technology sector; core drivers include accelerating threats that are...

Demystifying Cybersecurity Threat Models: A Natural Language Approach

In the evolving realm of cybersecurity, the development and implementation of robust threat models are the cornerstone of proactive defense...

Shining a Light on Dark Data

Dark Data. Sounds kind of cool/scary, but what is it? And why should you care? Short version? It’s the data...

AI’s critical role in a curated cybersecurity ecosystem

The ability to quickly detect and remediate threats has become the primary challenge across the substantial global technology ecosystem. To...

Beyond SQL: Leveraging Natural Language Processing for Enhanced Cybersecurity and Threat Management

Given the genuine sense of urgency that drives most cybersecurity initiatives, the ability to swiftly and accurately query log files...

Transformative Power: AI – Generated Executive Summaries for Cybersecurity Indicators of Compromise

Cybersecurity threats are (unfortunately) endemic, and accelerating not only in terms of volume but also sophistication. Security teams are constantly...

The imperative for real-time speed and unlimited lookbacks

In the nonstop turbulence that characterizes cybersecurity, Chief Information Security Officers (CISOs) play a pivotal role in piloting their organizations...

The Smarter Path beyond Legacy SIEMs

Security teams have long relied on traditional SIEM (security information and event management) solutions as a core element of their...

How Generative AI and Security Analytics Accelerate Cybercrime Investigations

Cybercrime has unfortunately become deeply embedded in the current technology landscape. Every single day another enterprise or government entity executes...

Demystifying Cybersecurity Threat Models through Natural Language

In the evolving realm of cybersecurity, the development and implementation of robust threat models are the cornerstone of proactive defense...

Top 10 cybersecurity trends and how to avoid stepping on a rake

Cybersecurity is arguably the most challenging and dynamic domain within the technology sector; core drivers include accelerating threats that are...

Cybersecurity Priorities for 2024 – Key Takeaways

Anomali has released the results of its 2024 Cybersecurity Priorities study. This is a highly targeted survey of 150 professionals...

Ransomware On The Rise: Is Your IT Organization Ready?

One of the leading healthcare institutions fighting the COVID-19 scourge, the University of California at San Francisco, was shaken down...

Crush every IT audit through Enterprise Technology Management

The annual or semi-annual IT audit is about as enjoyable as a root canal. Counting devices and licenses. Checking on...

Ready for Real-Time Compliance?

What’s even more challenging than periodic compliance? Real-time compliance. Many IT teams and CIOs view System and Organization Controls (SOC)...

Connecting IT Management to Workflows

IT Infrastructure and workflow are connected. Enterprise technology does not work as a series of stand-alone items. No one uses...

Workflows and the rise of true holistic integration

Every business runs on workflows. Whether you process mortgages, manufacture machinery, provide health care, or nearly anything, your business output...

Enterprise Technology Management and Cybersecurity

We are living in the era of the fully connected enterprise, and of near-constant cybersecurity threats. CTOs and CISOs have...

How IT audits can reduce your attack surface

For many CIOs and their IT teams, audits are a painful inconvenience. Traditionally audits involved building detailed spreadsheets with data...

How ready are you for a hybrid IT environment?

Working in the enterprise IT domain has always been interesting; regardless of how prepared you think you are, there is...

Five critical endpoint security issues addressed by Enterprise Technology Management

Endpoint security is and will continue to be front and center in the scheme of things that keep your IT...

The five biggest threats to Cloud Security

As more employees and business processes shift to a Cloud-based model, a whole new raft of potential risks surface, many...

Four ways to uplevel visibility into your potential attack surface

Ransomware (everyone’s least favorite software) is entering a new phase. As the world drags itself out of the Covid swamp...

Enable cybersecurity through better technology management

Security has always been a top-line consideration for every enterprise, and given the direction in which the world seems headed...

Getting asset lifecycle management right from the start

What is meant by asset lifecycle management? IT asset lifecycle management is the systematic process of purchasing, securing, monitoring, maintaining...

How to manage inherent endpoint risk in a hybrid IT environment

For many years, IT’s job in terms of managing endpoint risk was complicated but straightforward; ensure any endpoint device (primarily...

Comprehensive Visibility – The Starting Point for Managing and Securing Assets in a Hybrid IT Environment

IT assets have historically been categorized as hardware – old school hardware (PCs, servers, etc.). That definition has been evolving...

Ten best practices for managing technology assets

As the pandemic continues to linger and disrupt, enterprises are settling into a new operational model that has work-from-anywhere as...

Managing endpoints in an increasingly dynamic IT environment

Endless complexity and the role of IT The management of mobile devices has become far more complex due to variables...

The evolution of ITAM in a hybrid IT ecosystem

How Enterprise Technology Management helps you dominate the “new normal” Managing information technology assets (ITAM) as a discipline has been...

The rise of true holistic integration

Every business runs on workflows. Whether you process mortgages, manufacture machinery, provide health care, or nearly anything, your business output...

Connecting the dots on IT Asset Management

Dot 1: IT Asset Management as a discipline has been around for quite a while. As an industry trend it is...

The sudden rise of the new normal

The requirements associated with on-boarding a new employee can be a very smooth experience, somewhat uneven, or a complete cluster...

Best practices for IT Asset Management and the remote workforce – Part 2

In the last blog post, we talked about best practices for dealing with a shifting workforce as the entire economy...

Best Practices for IT Asset Management and the remote workforce – Part 1

The speed and breadth of the Coronavirus pandemic have caught pretty much everyone off guard. The result across both the...

The critical role of IT Asset Management in adding value to the enterprise

Information Technology has always been the core enabler of modern business. Regardless of what that business actually delivers (energy, health...

Right-Sizing Your On-Demand Infrastructure for Payment Processing in Any Cloud

In an ideal world, consumer-facing online businesses would deliver a consistent, efficient, and secure payment processing experience to their customers...

High-Speed Transaction Processing with No Compromise on Fraud Detection

Transaction processing in today’s global payments networks is what essentially powers the global economy. The framework for transaction processing has...

Open Banking and the Application of In-Memory Technologies

The Open Banking initiative, also referred to as PSD2 (Payment Services Directive), is a textbook example of streaming technology applied...

Stream processing and retail banking

Stream processing refers to real-time management of data entering a banking system (or any information system, actually) at high speed and...

How in-memory computing powers artificial intelligence

Artificial Intelligence (AI) as a concept has been around since the development of computational devices, as early as the creation...

5G and In-Memory Deliver on the Promise of Genuinely Cool Technology

Another massive, transformative technology wave is about to hit, and while this won’t be quite as overt as some of...

A Business Level View of Kubernetes, Cloud Migration and In-Memory Technologies

There’s a trio of buzzwords that are starting to spend more time in proximity to each other, and are also...

Why the CAP Theorem is relevant to a business person

The data we continuously generate and use operates on an incredibly vast scale (think of Google, Amazon, Facebook, that level...

Executing Machine Learning at Scale and Speed

One of the current hot topics driving the in-memory domain is the potential associated with the application of Machine Learning...

How Streaming Microservices Can Advance Your Entire IT Environment

Repost from Hazelcast, Streaming microservices. Sounds pretty cool, right? And like a lot of new technologies, it actually is, and...

The business case for In-Memory Technology

Repost from Hazelcast. Any business that is expanding and leveraging transformative technologies, such as IoT or in-memory computing, is already...

In Memory Data Grid vs. In Memory Database

The technologies that are most present in our lives are often ones we don’t realize exist, (even within the IT...

Hazelcast accelerates IBM Cloud Private

In response to market forces that are both broad and deep, IBM has been moving deliberately and systematically to a...

What Is Stream Processing and Why Is It Important to Your Business?

Reposted from Hazelcast. Stream processing is a term that is becoming increasingly relevant to the technical side of any company...

Transformational Drivers and In-Memory Data Grids

Reposted from Hazelcast:  One of the rewards of a career in technology is experiencing first hand the constant, pervasive, game...

Big Data Concerns and Enablers

The concept of “Big Data” surfaced in 2005, when it was first coined by O’Reilly Media, referring to the (then)...

Is blockchain-as-a-service the next big thing?

The next big thing in blockchain is, in fact, really really big. At least in terms of who’s driving the...

Using blockchain to bridge the gap

There has been a running battle for years between the advertising industry – driven by a vast, complex ecosystem, and...

Blockchain: Why boring can be sexy

While there is a tremendous amount of noise around blockchain, it appears to be contained in a bubble. If you...

Blockchain : Whose identity is it anyway?

There is a rapidly growing array of potential use cases for applying blockchain outside of cryptocurrency. In my last blog...

The role of blockchain in enabling software lifecycles

Blockchain. Nearly anyone who spends time online has heard of it, yet very few people really understand what it does...

Why ITOM and DevOps are more critical than ever

We’ve reached the point where nearly every aspect of our lives are interconnected. Our homes, cars, offices, our commutes, practically...

Running towards the ITOM challenge

Continuous adaptability is what separates market leaders from cautionary footnotes. There is a rapidly accelerating confluence of deep, pervasive currents...

The cold/warm embrace of IoT

What drives adoption of IoT at the consumer level? Presumably convenience (easy to set up and use), enablement (delivers promised...

IoT and Security – Same as always, only more so.

Chuck Martin over at MediaPost recently wrote an article with some interesting insights on consumer perspectives on IoT. While there...

IoT – Am I pleased or frightened?

IoT has become a very noisy space recently; driven by the fact that a significant part of the operating framework...

IoT and the cheerfully oblivious customer

Functions within companies that service end-user needs have historically relied on their customer’s transactional data to determine interests, habits and...

How infrastructure convergence drives IoT

For those of us who have spent their careers in the technology space, having a long-term perspective helps to recognize...

Integrated Data is the Key for State Agencies to Become More Customer-centric

During the past few years, there has been considerable discussion and media attention about the impact of digital natives (Millennials...

How Data-Integrity Technology Can Help Create a Patient Health Timeline

For healthcare providers to deliver the best diagnosis and treatment for their patients, the data on which they rely must...

Your current discovery tool is not giving you what you need

Here is what you need to know Your current discovery tool is not up to the task – period. Discovery...

Five key barriers to IT/OT integration and how to overcome them

Operational Technology (OT) consists of hardware and software that are designed to detect or cause changes in physical processes through...

Answers to 8 essential questions about assets that should be in your CMDB

Your Configuration Management Database (CMDB) is continuously increasing in size and complexity, driven by an endless list of components that...

The future is closer than you think. Data is coming (and fast), how will you manage it?

What will you do when your job and the future of your company hinges on your ability to analyze almost...

Machine Learning is re-inventing Business Process Optimization

Machine Learning is a game changer for business process optimization – enabling organizations to achieve levels of cost and quality...

Optimizing Business Performance with People, Process, and Data

People are the heart and mind of your business. Processes form the backbone of your operations. Data is the lifeblood...

IT under attack: Data Quality Technology helps companies assess security vulnerabilities

In the wake of the most recent (May 2017) malware attack impacting computer systems around the world, company executives are...

Machine Learning and the rise of the Dynamic Enterprise

The term “dynamic enterprise” was introduced during 2008, as an enterprise architecture concept. Rather than striving for stability, predictability and...

How ITSM tools miss the boat on operational data management

For most companies, IT Service Management (ITSM) tools are the core hub for monitoring and managing the systems used to...

Why CMDBs are sexier than you think

Sexy may not be the first word that comes to mind when you think about your CMDB and the operational...

Data Integrity: the key to operational insights or the elephant in the room?

Throughout history, business has always struggled with the challenge of data accuracy and integrity. While there is clear operational and...

Why is IT Operational data important for IT?

Each day, with every customer transaction, employee task and business process, companies generate vast amounts of operational data that provides...

IT Management is becoming predictive – which is good, right?

Improvements in IT data quality and analysis tools have enabled IT management to spend less time looking into the past...

The downstream impact of IT data improvements

How well prepared is your organization for growth? What are the challenges to making progress? One often overlooked constraint is...

Is data management a thorn in IT’s side?

Modern business leaders depend on data – it provides insights into operational performance, customer needs, supplier risks, market opportunities and...

The rise of IoT, what should IT execs be most worried about?

The core role of IT executives is to drive strategic enablement by stewarding the information and technology resources of the...

What your ITSM vendors don’t want you to know about Discovery Technology

Are you comfortable with how your IT Service Management (ITSM) processes address the volume, diversity and rate of change present...

Benefits of Machine Learning in IT Infrastructure

During the next 5 years, machine learning is poised to play a pivotal and transformational role in how IT Infrastructure...

Securing the Internet of Things

This blog post, covering the Internet of Things, considers security challenges. Security has always been a high order concern in...

Information Technology, Operational Technology, and the Internet of Things

This blog has previously mentioned the relationship between IT Asset Management (normally under the control of IT) and Fixed Asset...

The two faces of the Internet of Things in the Data center

The ascension of the Internet of Things (IoT) will have two profound effects on data center operations. First, IoT techniques...

No post found