Betsy Amy-Vogt

Betsy Amy-Vogt is a staff writer for theCUBE, SiliconANGLE Media’s mobile livestreaming studio. A digital nomad before the term existed, Betsy started her writing career at a tech startup in Austin, Texas, before taking her laptop off around the globe. When not writing tech news blogs or working on her latest sci-fi fantasy novel, she volunteers at Hekab Be bilingual library and community center in Akumal, Mexico. Got news? Tweet it to @siliconangle.

Latest from Betsy Amy-Vogt

Data security strategies continue to evolve in response to expanding threat landscape

What is the difference between a chief information security officer and a chief security officer? In some companies, it’s a matter of semantics rather than responsibilities. But for Shawn Henry (pictured, right), president of the Services Division and chief security officer of CrowdStrike Holdings Inc., the distinction is important. While a CISO oversees all things ...
VIDEO EXCLUSIVE

Three insights you might have missed from the ‘Democratizing Analytics Across the Enterprise’ event

How a company uses data is critical to its competitive advantage. With the business landscape predicted to continue its ever-faster transformation, organizations are investing in analytics solutions to take advantage of data resources. Seventy-three percent of organizations indicate analytics spend will outpace other software investments in the next 12 to 18 months, according to the ...

Democratizing analytics across the enterprise: Alteryx-IDC study reveals key insights

Spreadsheets have been the workhorse of data analytics for decades. But progress means change, and data-driven businesses can’t maximize the potential of their technology investments if their employees keep using outdated tools. Ninety-three percent of organizations surveyed for a recently released Alteryx-commissioned IDC InfoBrief report say they are not fully utilizing the analytics skills of their ...
VIDEO EXCLUSIVE

Three insights you might have missed from the ‘Cybersecurity — Detect and Protect Against Threats’ event

The COVID pandemic was the last straw for traditional security. The expanding attack surface and heightened threat landscape required a new paradigm for protection. Waging a war where the odds were stacked against them, organizations turned to their cloud providers for help. “The cloud is now the first line of defense,” theCUBE industry analyst Dave ...

IDC reports widening gap between companies with democratized data and analytics access and those without

Keeping up with the changing business landscape is a challenge that all businesses are facing. Remaining competitive requires continually optimizing processes and fine-tuning the customer experience. The key to this, as every organization now knows, is through real-time insights gained from effective data analysis. Data and analytics spend tops all other software investments in 73% ...

What to expect during the ‘Democratizing Analytics Across the Enterprise’ event: Join theCUBE Sept. 13

Data and analytics were cited as the top investment priority for 53% of senior executives in a recent Ernst & Young LLP survey, and according to International Data Corp. Inc. research, 73% of companies will spend more on analytics software over the next 12-18 months than all other software investment. The reason is simple: Data ...

What to expect during Fal.Con: Join theCUBE Sept. 20-21

Any cybersecurity vendor can say their product protects against attacks. But how many have proof of 100% prevention against lateral movement within an environment? In recent evaluation trials conducted by the non-profit research organization The MITRE Corp., CrowdStrike Holdings Inc.’s Falcon Platform identified and prevented 100% of attacks emulating known tactics of the Wizard Spider and Voodoo Bear threat ...

Autonomous security operations center platform tackles SIEM stress

Outwitting an enemy requires understanding how they think and why they act. Unfortunately, in the current cybersecurity war, the black hat hackers are winning the battle of wits: Cybercrime is the number one type of fraud experienced across all industries. The problem doesn’t come from a lack of effort by the good guys. Security teams ...

Increased trust in open-source tools helps shift the cloud security paradigm

Nothing is the same after digital transformation. The changes that people thought were purely technical caused a ripple effect out across people and processes as well. Unfortunately, security is only now realizing that creating a fixed blueprint of rules for everyone to follow doesn’t work in the rapidly moving, complex world of cloud computing. Playing ...

Zero-trust segmentation platform provides attack surface visibility across on-premises and cloud

The “castle-and-moat” security model, where everyone inside a perimeter was assumed to be trusted, has been abandoned in favor of zero-trust security, where verification is required from all devices and parties operating inside and outside a network. The shift has been swift and almost total. In 2019, only 16% of companies had zero-trust security initiatives ...