Sequence of a soap bubble pursting
Bubble burst 123rf

When Security Vendors Fail

The following is an excerpt from Security Yearbook 2021. Available for pre-order here. For the record this was first posted to Forbes on March 26, but was taken down by Forbes. Learning from failure is one of the most valuable reasons to study history. Successes like Check Point Software in Israel lead to more investment,…

READ MORE

2020 Was a Very Good Year for Cybersecurity

2020 Performance of Public Cybersecurity Companies When evaluating a year’s history in the cybersecurity industry one valuable measure is the stock performance of those companies that are publicly traded. As can be seen in this chart these 21 vendors did very well in aggregate during 2020. On average they grew 58%. Unlike the Financial Crisis…

READ MORE

Prediction 2021: Data Privacy in Faith Based Organizations

The proliferation of privacy rules will drive Faith-based Organizations (FBOs) to partner with trusted providers. Why do we think that? Because data is the most important asset of faith-based organizations and it is now critical for faith-based organizations to select providers able to manage evolving data categories and protection protocols which may include online behaviors,…

READ MORE

Prediction 2021: Vendors Fail to Deliver on IRM

Through 2023, GRC software vendors will not deliver a standalone solution for Integrated Risk Management (IRM). Integrated Risk Management enables improved decision making and delivers more business value by integrating risk intelligence with business intelligence in activities across the enterprise. So, GRC vendors or Governance Risk and Compliance software vendors have relabeled their solutions from…

READ MORE

Prediction 2021: Ransomware Gangs

Attackers are getting better at targeting at-risk industries and critical infrastructure. This trend accelerated during the early days of COVID when health systems and aid organizations were targeted by human-operated ransomware gangs. Attackers know that, when an organization’s remit is extremely time sensitive, disrupted operation can lead to loss of lives and other severe impacts.…

READ MORE
The Analyst Syndicate

Data Privacy: Key Terms

Many people celebrate Merry Christmas on December 25th of each year but not the Eastern Orthodox. They celebrate on January 7th. The reason is discrepancies between the Julian (46 BC) and Gregorian (1582) calendars due to leap years and seasonal equinoxes being omitted. This difference is analogous for many businesses and service providers. As they…

READ MORE
ERP Software

“You have zero privacy anyway. Get over it! (Scott McNealy, 1999)

Merriam-webster.com defines oxymoron to mean a combination of contradictory or incongruous words, such as, jumbo shrimp or lead ballon. We enjoy oxymorons so much: many websites exist just to collect examples that enable us to use these figures of speech to illustrate irony, sarcasm or the unexpected, such as, Mike and Phil as leaders are…

READ MORE

Why Cybersecurity Architecture?

For the last year, my partner Ed Moyle and I have been writing a book that we wish we’d had when we were starting out in our careers. A practical, no-nonsense guide to security architecture. As experienced technical architects, we know the value of a strategic plan. One way we learned that value, was the…

READ MORE