The Centaur Enterprise: Human-Agent Teams, Real Context, and the New Architecture of Trust
The centaur, in chess, is the human-machine team that consistently outperforms either alone...
From Storage to Signal: Architecting the Data Substrate That Powers Secure AI
The modern enterprise is not running out of data. It is running out of time to understand...
When Intelligence Meets Infrastructure: Rebuilding the Data and Security Stack for AI-Native Operations
For years, enterprise technology leaders treated data infrastructure and security operations...
The Architecture of Trust in an Agentic World
AI is moving from reasoning to action, embedding autonomy directly into enterprise systems...
Selling Platforms to Buyers Who Think in Use Cases
Every platform company eventually encounters the same quiet resistance. Products mature...
What Product Marketing Leaders Must Understand About Modern Architectures
There was a time when systems architecture was someone else’s problem. Product marketing...
Trust Is an Emergent Property of Systems, Not a Slogan
There was a time when trust could be claimed. A badge on a website, a compliance statement...
The Birth of Synthetic Archetypes
Summary: This blog explores how generative AI is not just automating tasks but also...
Marketing After the Singularity: How to Lead with Humanity in the Age of AI
Somewhere between the first Slack thread about “leveraging AI for content efficiency” and...
From Noise to Signal: The Next Frontier in Cyber Defense
The cybersecurity world doesn’t suffer from a shortage of data. It suffers from a shortage...
The Sentient Edge: How AI-Driven SOAR and IMDGs can redefine Cloud Security in real time
The security perimeter is gone. What remains is not a wall, but a web, dispersed, dynamic...
Unlocking Transformation Through Intelligent Data Discovery, Integration, and Governance
Data is not merely an operational asset; it is a strategic substrate. As enterprises embrace...
IoT, Agentic AI, and Cybersecurity: A Strategic Inflection Point for Enterprise GRC
Operational technology, information systems, and artificial intelligence, once distinct...
The Rise of Synthetic Threat Actors: How Agentic AI Is Rewriting the Rules of Cyber Defense
Criminal threats have historically been rooted in human behavior. Robbery, assaults...
Security-First GRC: How Solutions Marketing Enables AI-Driven Resilience
As we are all learning the hard way, the potential digital attack surface is expanding...
From Product Chaos to Platform Clarity
How Product Marketing Leads the Path to Integration In the early days of high-growth...
Dark Data as a Cybersecurity and Compliance Time Bomb, and How Agentic AI Can Defuse It
Data is one of the core drivers of the global economic engine, but it brings a mounting...
Compliance and Governance in Vulnerability Management
Balancing security and compliance is no small task. Organizations need to protect their...
Security strategies for the Digital Operations Resilience Act
The implementation of the Digital Operational Resilience Act (DORA) in the EU in January...
Strengthening ITSM with Actionable Threat Intelligence
Any cybersecurity incident ultimately impacts IT operations and infrastructure. It often...
Infrastructure Management and SIEM for Cyber Success
Enterprises are getting slammed with operational and security challenges that highlight the...
The Synergy Between Monitoring, Alerting, and Threat Intelligence
Operational efficiency and security resilience are both critical priorities for enterprises...
Understanding the Similarities and Differences of Monitoring and Observability
Monitoring and observability. At a casual glance, they sound similar, with only a fuzzy grey...
The history and future of cybersecurity – from 1980 to 2120
It’s the time of the year when people like to predict what will likely happen in the...
Cyber Threat Hunting: Step-by-Step Guide and Best Practices
Cyber threat hunting is a proactive method for tracking down and remediating advanced...
Top Use Cases for Threat Intelligence
Threat Intelligence Platforms (TIPs) help organizations quickly understand, anticipate...
The Intersection of SecOps and ITOps: The New BFFs
The holy grail of operational excellence requires the seamless integration of two critical...
Outpacing Modern Threats with Immediate Security Analytics
The motto for today’s cybersecurity teams should be “Blink, and you’ll miss it.” A robust...
Understanding SIEM and XDR: A Comprehensive Comparison for Security Operations Centers
Cybersecurity teams, regardless of the size of their business or the industry they work in...
The MITRE ATT&CK Framework: A Deep Dive into Its Development, Applications, and Future Evolution
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common...
How AI is Driving the Evolution of Threat Intelligence
The widespread use of generative AI (GenAI) is transforming the field of threat...
Leveraging Data Enrichment in Cyber Threat Intelligence
Cyber Threat Intelligence (CTI) is a critical component of any cybersecurity strategy. It...
An Overview of Query Languages Used in Cybersecurity and SIEM
Query languages play an essential role in threat detection, incident response, and overall...
A Deep Dive into Different Types of Threat Intelligence
Threat intelligence is the lifeblood of cybersecurity, keeping your organization abreast of...
Understanding the Differences and Similarities Between SIEM and SOAR
Security information and event management (SIEM) and security orchestration, automation, and...
Top Three Cybersecurity Concerns and What to Do About Them
Chief Information Security Officers (CISOs) have a particularly tough challenge. No one...
Dealing with Security Threats at Scale
Picture a major government agency responsible for overseeing several major health insurance...
Top 10 Cybersecurity Trends and What You Need to Do about Them Now
Cybersecurity is arguably the most challenging and dynamic domain within the technology...
Demystifying Cybersecurity Threat Models: A Natural Language Approach
In the evolving realm of cybersecurity, the development and implementation of robust threat...
Shining a Light on Dark Data
Dark Data. Sounds kind of cool/scary, but what is it? And why should you care? Short...
AI’s critical role in a curated cybersecurity ecosystem
The ability to quickly detect and remediate threats has become the primary challenge across...
Beyond SQL: Leveraging Natural Language Processing for Enhanced Cybersecurity and Threat Management
Given the genuine sense of urgency that drives most cybersecurity initiatives, the ability...
Transformative Power: AI – Generated Executive Summaries for Cybersecurity Indicators of Compromise
Cybersecurity threats are (unfortunately) endemic, and accelerating not only in terms of...
The imperative for real-time speed and unlimited lookbacks
Chief Information Security Officers (CISOs) play a pivotal role in piloting their...
The Smarter Path beyond Legacy SIEMs
Security teams have long relied on traditional SIEM (security information and event...
How Generative AI and Security Analytics Accelerate Cybercrime Investigations
Cybercrime has unfortunately become deeply embedded in the current technology landscape...
Demystifying Cybersecurity Threat Models through Natural Language
The development and implementation of robust threat models are the cornerstone of proactive...
Cybersecurity Priorities for 2024 – Key Takeaways
Anomali has released the results of its 2024 Cybersecurity Priorities study. This is a...
Ransomware On The Rise: Is Your IT Organization Ready?
One of the leading healthcare institutions fighting the COVID-19 scourge, the University of...
Crush every IT audit through Enterprise Technology Management
The annual or semi-annual IT audit is about as enjoyable as a root canal. Counting devices...
Ready for Real-Time Compliance?
What’s even more challenging than periodic compliance? Real-time compliance. Many IT...
Connecting IT Management to Workflows
IT Infrastructure and workflow are connected. Enterprise technology does not work as a...
Workflows and the rise of true holistic integration
Every business runs on workflows. Whether you process mortgages, manufacture machinery...
Enterprise Technology Management and Cybersecurity
We are living in the era of the fully connected enterprise, and of near-constant...
How IT audits can reduce your attack surface
For many CIOs and their IT teams, audits are a painful inconvenience. Traditionally audits...
How ready are you for a hybrid IT environment?
Working in the enterprise IT domain has always been interesting; regardless of how prepared...
Five critical endpoint security issues addressed by Enterprise Technology Management
Endpoint security is and will continue to be front and center in the scheme of things that...
The five biggest threats to Cloud Security
As more employees and business processes shift to a Cloud-based model, a whole new raft of...
Four ways to uplevel visibility into your potential attack surface
Ransomware (everyone’s least favorite software) is entering a new phase. As the world drags...
Enable cybersecurity through better technology management
Security has always been a top-line consideration for every enterprise, and given the...
Getting asset lifecycle management right from the start
What is meant by asset lifecycle management? IT asset lifecycle management is the systematic...
How to manage inherent endpoint risk in a hybrid IT environment
For many years, IT’s job in terms of managing endpoint risk was complicated but...
Comprehensive Visibility – The Starting Point for Managing and Securing Assets in a Hybrid IT Environment
IT assets have historically been categorized as hardware – old school hardware (PCs...
Ten best practices for managing technology assets
As the pandemic continues to linger and disrupt, enterprises are settling into a new...
Managing endpoints in an increasingly dynamic IT environment
Endless complexity and the role of IT The management of mobile devices has become far more...
The evolution of ITAM in a hybrid IT ecosystem
How Enterprise Technology Management helps you dominate the “new normal” Managing...
The rise of true holistic integration
Every business runs on workflows. Whether you process mortgages, manufacture machinery...
Connecting the dots on IT Asset Management
Dot 1: IT Asset Management as a discipline has been around for quite a while. As an...
The sudden rise of the new normal
The requirements associated with on-boarding a new employee can be a very smooth experience...
Best practices for IT Asset Management and the remote workforce – Part 2
In the last blog post, we talked about best practices for dealing with a shifting workforce...
Best Practices for IT Asset Management and the remote workforce – Part 1
The speed and breadth of the Coronavirus pandemic have caught pretty much everyone off...
The critical role of IT Asset Management in adding value to the enterprise
Information Technology has always been the core enabler of modern business. Regardless of...
Right-Sizing Your On-Demand Infrastructure for Payment Processing in Any Cloud
In an ideal world, consumer-facing online businesses would deliver a consistent, efficient...
High-Speed Transaction Processing with No Compromise on Fraud Detection
Transaction processing in today’s global payments networks is what essentially powers the...
Open Banking and the Application of In-Memory Technologies
The Open Banking initiative, also referred to as PSD2 (Payment Services Directive), is a...
Stream processing and retail banking
Stream processing refers to real-time management of data entering a banking system (or...
How in-memory computing powers artificial intelligence
Artificial Intelligence (AI) as a concept has been around since the development of...
5G and In-Memory Deliver on the Promise of Genuinely Cool Technology
Another massive, transformative technology wave is about to hit, and while this won’t be...
A Business Level View of Kubernetes, Cloud Migration and In-Memory Technologies
There’s a trio of buzzwords that are starting to spend more time in proximity to each other...
Why the CAP Theorem is relevant to a business person
The data we continuously generate and use operates on an incredibly vast scale (think of...
Executing Machine Learning at Scale and Speed
One of the current hot topics driving the in-memory domain is the potential associated with...
How Streaming Microservices Can Advance Your Entire IT Environment
Repost from Hazelcast, Streaming microservices. Sounds pretty cool, right? And like a lot of...
The business case for In-Memory Technology
Repost from Hazelcast. Any business that is expanding and leveraging transformative...
In Memory Data Grid vs. In Memory Database
The technologies that are most present in our lives are often ones we don’t realize exist...
Hazelcast accelerates IBM Cloud Private
In response to market forces that are both broad and deep, IBM has been moving deliberately...
What Is Stream Processing and Why Is It Important to Your Business?
Reposted from Hazelcast. Stream processing is a term that is becoming increasingly relevant...
Transformational Drivers and In-Memory Data Grids
Reposted from Hazelcast: One of the rewards of a career in technology is experiencing first...
Big Data Concerns and Enablers
The concept of “Big Data” surfaced in 2005, when it was first coined by O’Reilly Media...
Is blockchain-as-a-service the next big thing?
The next big thing in blockchain is, in fact, really really big. At least in terms of who’s...
Using blockchain to bridge the gap
There has been a running battle for years between the advertising industry – driven by...
Blockchain: Why boring can be sexy
While there is a tremendous amount of noise around blockchain, it appears to be contained in...
Blockchain : Whose identity is it anyway?
There is a rapidly growing array of potential use cases for applying blockchain outside of...
The role of blockchain in enabling software lifecycles
Blockchain. Nearly anyone who spends time online has heard of it, yet very few people really...
Why ITOM and DevOps are more critical than ever
We’ve reached the point where nearly every aspect of our lives are interconnected. Our...
Running towards the ITOM challenge
Continuous adaptability is what separates market leaders from cautionary footnotes. There is...
The cold/warm embrace of IoT
What drives adoption of IoT at the consumer level? Presumably convenience (easy to set up...
IoT and Security – Same as always, only more so.
Chuck Martin over at MediaPost recently wrote an article with some interesting insights on...
IoT – Am I pleased or frightened?
IoT has become a very noisy space recently; driven by the fact that a significant part of...
IoT and the cheerfully oblivious customer
Functions within companies that service end-user needs have historically relied on their...
How infrastructure convergence drives IoT
For those of us who have spent their careers in the technology space, having a long-term...
No post found


































































































