vSphere adds mobile management capability
With BYOD ubiquitous, it is becoming just about mandatory for vendors to have the ability to manage their solutions via mobile interface. Having a web-based GUI that might be able to run on a phone's...
View ArticleRSA Conference: Are you going to San Francisco?
Well it is the end of February, and like instinct drawing birds to migrate, information security people are drawn to San Francisco for the RSA Conference. In some ways, RSA represents the security...
View ArticleWill software eat the security industry?
Well, the first day of RSA week is in the books and things are off to a rousing start. My day started early today as I was the moderator of a great panel at the Americas Growth Capital Conference. My...
View ArticleCA moves from 'constantly acquiring' to innovation factory
Growing up on Long Island, Computer Associates was the local big dog in technology. Founder Charles Wang owned the Islanders hockey team - he was a legendary success, our own Long Island version of...
View ArticleAT&T KitKat upgrade made my Galaxy S4 worse
AT&T finally got around to issuing an upgrade to Android KitKat for their Samsung Galaxy S4s running Jelly Bean two weeks ago. Against my better judgment and after waiting about a week, I decided...
View ArticleCloud providers as cloud security providers
One of my observations from the RSA Conference this year was the continuing evolution of cloud providers into cloud security providers. Where it used to be said that security was one of the drags on...
View ArticleZscaler dreams of 'Shift'-ing routing to the cloud
Imagine moving your router from your perimeter up to the cloud. What's more, let's let someone else manage it, bake in security, give you greater visibility, stability, and management control, all...
View ArticleHybrid Clouds as far as the eye can see
I was talking to my friend Misha Govshteyn of Alert Logic the other day about the latest versions of Alert Logic's Threat Manager and Web Security Manager. Misha was very excited because, with the...
View ArticleIBM's BlueMix delivers PaaS to developers large and small
IBM's recent Pulse Conference in Las Vegas was like Christmas in February for developers. Whether working in midmarket or large enterprises, independent consultant or employee, there was something for...
View ArticleDocker becomes de facto Linux standard
Lots of news coming out of the Red Hat Summit this week. A lot of the buzz is around containerization in general and Docker in particular. Docker is set to ship with the latest version of RHEL (RHEL...
View ArticleMongoDB 2.6 - NoSQL all grown up
NoSQL databases have been bursting into the market for a few years now. However, many DBAs still winked and smiled when discussing NoSQL, the way an older cousin looks down on a younger relative. Cute...
View ArticleMicrosoft Office vs Google Docs: The Fat Lady hasn't sung yet
I was reading ComputerWorld's Preston Gralla's article on Microsoft Office whipping Google Docs. I just don't see it. While I agree that you can't compare the feature set of power tools that MS Office...
View ArticleJumpCloud just made cron obsolete
For just about as long as I have been in technology, when I spoke to engineers about having a specific task run on schedule I was told that we could "run a cron job" to make it happen. Over the years...
View ArticleMasergy adds MSSP to its lineup
I first became aware of Masergy back in the early part of the last decade. Since that time they have grown into a network services powerhouse offering a wide range of network services to a global...
View ArticleSecurity admins and executives: We hardly talk anymore
At this past year's RSA Conference, I was the moderator on a panel about "Security Metrics: What matters?" One of the participants was my friend Jody Brazil, President of Firemon. Jody referenced a...
View ArticleOn security reports and weather forecasts
Well, we are deep into the security report season. What started as a drizzle with the RSA conference has turned into a torrent. Of course, the Verizon Data Breach report has become the big dog of...
View ArticleThe day the AV died
I was a lonely teenage broncin' buck ~ Don McLean, American Pie With a pink carnation and a pickup truck But I knew I was out of luck The day the music diedSeems like everyone is all a-twitter (see...
View ArticleUpgrade to Samsung Galaxy S5? No thanks
For those who don't read my blog here regularly, I am not a big fan of the Samsung Galaxy phones. In fact, I think my Samsung Galaxy S4 is the worst phone I have ever owned and have written so several...
View ArticleSilly rabbit, there's no such thing as DevOps in a box
Yesterday out in Boulder, Colorado, I hosted the first Camp DevOps held in partnership with Glue Conference 2014 (Glue is today if you are in the Denver/Boulder area). It was a great conference with a...
View ArticleDevOps isn't viable for enterprise? Tell that to IBM
There has been quite a bit of controversy lately over an article in the Wall Street Journal about whether or not DevOps was viable for enterprises. After spending a few days here in Orlando at the IBM...
View ArticleHow high-performing IT departments affect their companies' bottom line
Many of us in the tech industry have suspected for a long time that companies that have great IT departments perform a lot better in this technology-dependent world we live in. But I was unaware if...
View ArticleFiremon brings policy automation to policy management
One of the neat things about my role as a consultant to the security industry is that I get to interact with lots of smart people and companies. One of the companies I occasionally consult for is...
View ArticleCloud security grows up
There was a time where cloud security was a bit of an oxymoron. But the fact is that the cloud has given the security industry a chance to reimagine and innovate to secure data both in the cloud and...
View ArticleCloud computing's not-so-secret mission
There is no denying that the cloud and cloud computing have changed the way many of us are doing business. You only had to attend last week’s sold out AWS re:Invent conference in Las Vegas to see the...
View ArticleCA's secret recipe: An organic engineering team
I spent the early part of last week at the Mandalay Bay Resort in Las Vegas attending CA World. This was a very different CA World than in the past. It wasn’t just that Magic Johnson and The Fray...
View ArticleHow Docker built a whale from a single container
Few tech companies are as hot right now as Docker. It seems everyone has gone goo-goo over containers. The funny thing is the idea of Linux containers is not really new, nor was Docker the first to...
View ArticleWhat benefits are driving DevOps adoption?
A new survey by CA Technologies shows that an eye-popping 88% of more than 1,400 IT or line-of-business executives have already adopted or plan to adopt DevOps within the next five years. This is up...
View ArticleEncryption: The security market's newest frontier
In response to the mind-numbing, never-ending reports of data breaches in the news, I am seeing a distinct move to data encryption as the latest best hope for information security. While encryption is...
View ArticleHow Security-as-a-Service can save an organization millions
In my 25+ years in IT, I have seen the outsource/insource pendulum swing back and forth. One of the popular arguments in favor of outsourcing is that it can save an organization dollars in total cost...
View ArticleIn IT security, continuous is the new black
We have gone from the city that never sleeps to a world that is continuous. That's right, it seems along with the world shrinking, it is always on, someone is always watching or doing. Continuous has...
View Article
More Pages to Explore .....