Mark Albertson
Latest from Mark Albertson
CYBERSECURITY SPECIAL REPORT
In harm’s way: Attacks on critical systems alarm the security world
One by one, power to homes, businesses, hospitals and transportation systems were shut down. It was Dec. 23, 2015, in the Ukraine and the nation’s electrical grid had been hacked. In the dead of winter. What events in the Ukraine revealed was that the world’s critical infrastructure was highly vulnerable to attack, both from outside ...
VIDEO EXCLUSIVE
Splunk’s security solution is a deep dive into the investigative lake
A case could be made that the current chaotic enterprise computing landscape offers firms such as Splunk Inc. a prime market opportunity. With so much surface area to protect, including multiple servers, endpoints and connected “internet of things” devices, managing the complex environment with logs in different formats is no easy task. Security in today’s enterprise ...
Fresh look at building automation security exposes network vulnerability
Engineers at Forescout Technologies Inc. call it the “wow effect.” When they meet with a client and present a complete overview of a network, the response is invariably a jaw-dropping, forehead-slapping exclamation. Many surprised customers often had no knowledge of how many devices were online or the threat exposure that created. “They had no idea ...
VIDEO EXCLUSIVE
What’s on my network? Forescout offers an agentless way to find out
When a person comes home, he or she probably wants to know fairly quickly if anyone else is inside and whether they’re friend or foe. The same is true for chief information officers who constantly ask: “What’s on my network?” As the number of “internet of things” devices connected to a network rises exponentially, so ...
CYBERSECURITY SPECIAL REPORT
In the cyber arms race, humans will replace computers in the crosshairs
Like a supercharged car powering up a steep mountain, cybersecurity threats have shifted into another gear. In the beginning, when “script kiddies” tapping on rudimentary computers in their parents’ basements would break into websites and deface them, attacks were a nuisance and not much more. As major businesses began to use the internet for transactional ...
Imanis Data leverages machine learning to address enterprise fragmentation
Data may be driving today’s enterprise, but the engine is only using a fraction of its horsepower. A recent information technology study by Cohesity Inc. found that a significant majority — approximately 80 percent — of an organization’s data is not mission critical. It’s languishing in backups, object stores and archives scattered across public and ...
From protection to management: Veeam focuses on data visibility, access and control
There is a saying in the sports world about athletes that the best ability is availability, always being able to play. The same case can be made in today’s multicloud world about data and its availability for the enterprise. Recent surveys of chief information officers and other enterprise information technology executives underscore this point. Deloitte’s ...
VIDEO EXCLUSIVE
Power Panel Q&A: entrepreneurs on the future of specialty clouds and open source
Businesses of all sizes are sorting through the maze of cloud and software options available in the market today. Single cloud or multicloud? Proprietary software or open source? Those and other prime topics in enterprise computing got the full treatment recently in a special panel discussion on theCUBE, SiliconANGLE Media’s video studio in Palo Alto, ...
Dell EMC launches multicloud tools for data protection in advance of RSA conference
Is network security an oxymoron? Like jumbo shrimp and awfully good, network security seems ripe for inclusion in the roll call of combined contradictory words, especially when considering the steady parade of high-profile breaches and cyberattacks. In the past month alone, a Toyota division’s computers were knocked out by an attack in Australia, Microsoft Corp. ...