Dan on Security

December 1, 2016

Understanding the Business Implications of the GDPR

With the growing importance of data analytics, businesses are discovering that they must walk a fine line  in how they handle and manage customer data. Data privacy both  from both regulatory and reputational standpoints is requiring companies to move cautiously. The latest round of regulations, including the EU’s GDPR, comes with stiff financial penalties for […]

Dan Kirsch 0 Comment
October 13, 2015

Why partnerships are key to building Internet of Things solutions

In a recent Hurwitz survey of companies building IoT solutions, one key finding made a big impression on me: More than 90% of respondents work with one or more partners to develop and manufacture their IoT solutions. Looking deeper into the survey findings, I could find many reasons why companies are finding partnerships essential to […]

Dan Kirsch 1 Comment
October 1, 2013

Splunk Offers a Powerful Platform — Will They Capitalize on the Opportunity for Growth?

Godfrey Sullivan’s Keynote for this year’s Splunk User Conference had the audience buzzing with excitement as Splunk Version 6 and Splunk Cloud were announced.  Both offerings are intended to allow business users to gain more actionable insight from Splunk’s ability to capture, store and search nearly any type of log-data.  Fraud detection for financial services companies was […]

Dan Kirsch 1 Comment
January 30, 2013

The Emergence of Big Data Security Intelligence

What’s Driving Big Data Security Intelligence? There is a new generation of security offerings that can anticipate threats and prevent them in real-time.  This new generation of offerings is emerging because of an increase level of risk.  Traditionally, security systems have worked by collecting and analyzing logs and then setting alerts to trigger action when […]

Dan Kirsch 0 Comment
July 31, 2012

Strategies to confront the rising democratization of IT

How employee’s use of cloud services are changing the way IT handles security Cloud computing has given business users the power to use sophisticated cloud services without the need to go through IT.  Well-meaning employees do not think about the potential risks associated with the cloud.  Software as a Service (SaaS) offerings like Facebook, Dropbox […]

Dan Kirsch 0 Comment
December 21, 2011

Holes in Endpoint Security

There is an avalanche of devices and end points that employees, customers and partners are beginning to utilize as they conduct even routine business transactions. An end point device might be a PC, smart phone or even a flash drive. The challenges of IT security are complicating the ability of organizations to protect their intellectual […]

Dan Kirsch 0 Comment
October 20, 2011

IBM Rethinks its Security Strategy

IBM is making a major push to try to establish leadership in the broad market for security, compliance, and governance.  The company’s latest foray is significant with the  acquisition of Q1 Labs.   On its own, this is an important acquisition because the company has developed significant intellectual property in security intelligence products in vital areas […]

Dan Kirsch 0 Comment