People, process and technology challenges with security operations
These days, it’s tough for any organization to keep up with cybersecurity operations. Why? Well, the bad guys are pretty persistent for starters, launching a blitzkrieg of attacks and new types of exploits all the time. OK, hackers are relentless, but we’ve always know this, and their behavior isn’t likely to change anytime soon. What’s really disturbing, however, is that a lot of problems associated with cybersecurity are based upon our own intransigence. And organizations aren’t struggling with one issue, rather cybersecurity operations challenges tend to be spread across people, processes and technology. When it comes to security operations, it’s kind of a "death by a thousand cuts" situation. To read this article in full or to leave a comment, please click here
We all know the future of enterprises is in flux with the consolidation or demise of Avaya/Nortel, Brocade/Foundry, Force 10, H3C and BNT assets. This speaks to the major trend of enterprise applications migrating to the cloud, any cloud be it public, private or hybrid. As this rapid transition prevails with efficiencies and scale, traditional applications and...