Tag Archives: Security

June 28, 2018

IBM CDO Conference: The Chief Data Officer Role Is Evolving

By Jean S. Bozman Chief Data Officers (CDOs) have a weighty responsibility: they are “on point” to find the actionable insights and data trends from analysis of data lakes, data repositories and virtual “seas” of data flowing across their large organizations. Data silos, different data formats – and organizational changes combining disparate data systems – […]

June 7, 2018

OpenStack Releases Kata Containers 1.0 for Container Security

By Jean S. Bozman As containers gain wider adoption to run enterprise applications in the hybrid cloud, customers are increasingly looking for approaches that ensure container security. There are many dimensions to this concern about container security – but the most pressing is the “immutability” of container contents. That is, all of the software that […]

May 4, 2018

GDPR Is Here — and Customers See Its Implications for Global Enterprise

  By Jean S. Bozman The worldwide nature of security threats and attacks has transformed the cybersecurity discussion from a U.S.-centric view to a global view of threats, data protection and data integrity. Case in point: the imminent start of the European Union’s General Data Protection Regulation (GDPR) enforcement on May 25, 2018 will affect […]

April 11, 2018

Container Security Should Be Top-of-Mind for DevOps Teams

By Jean S. Bozman Containers are being readily adopted for born-on-the-web workloads by hyperscalers, cloud providers and DevOps organizations. Now, as more enterprise applications and databases are migrating to containers, developers must be mindful of the continuing need for security. Driven by digital transformation to modernize traditional IT infrastructure, container adoption is showing strong growth. […]

February 2, 2017

Cybersecurity: Three Paths to Better Data Integration

Data integration from multiple security point-products is a real problem for many enterprise customers. There are too many threat intelligence feeds – and no easy way to view all incoming data in a contextual way that facilitates interpretation, analysis, and remediation. Therefore, knocking down your organization’s in-house security software silos may become an essential element to […]

0 Comment
February 2, 2017

How Can You Drive #PositiveSecurity?

I’m a big car nut so I wondered if there are any parallels between the evolution of cars and IT security. Seven years after the first automobile was produced by Karl Benz in 1886, electronic security started when the wireless telegraph, the first network was hacked. While both technologies were have born in similar eras, their […]

0 Comment
January 27, 2017

Enterprise Clouds Demand Enhanced Security and Availability

Security and availability are top-of-mind IT concerns about enterprise clouds – and transferring enterprise workloads to hybrid clouds. I’ve said it before, and I’ll say it again – security and availability are not going away just because we’re in the age of cloud computing. Rather, customers must evaluate their on-premises requirements for both security and […]

0 Comment
December 15, 2016

2017 Predictions from the Hurwitz Team

Last year we predicted that it would be a year of consolidation and a time for businesses to absorb emerging technologies. We think that this trend wil continue. This year we are digging in around seven different areas. Each area will have three predictions from our impressive analyst team. It is a lot to look […]

0 Comment