Johna Till Johnson's blog

By Johna Till Johnson
On Nov 09, 2015

Blue Coat’s $280 Million Elastica Acquisition Highlights Cloud Security

Monday, November 9, 2015

The recently-announced acquisition by Blue Coat of privately-held Elastica Inc. for $280 million highlights the growing importance of cloud security, and reconfigures the security landscape for infosec professionals, security vendors, and service providers and channel partners.

By Johna Till Johnson
On Oct 28, 2015

The Only Cybersecurity Maturity Model You'll Ever Need

Monday, October 26, 2015

Consulting firms love maturity models. These are frameworks that tell companies how well they’re doing in key areas, based on the tools they’re using, how they’re organized, and how effective their efforts are.

By Johna Till Johnson
On Oct 26, 2015

Next-Generation Application Security: The Time Is Now

Monday, October 26, 2015

If you’re like most enterprise organizations, state-of-the-art application security means some combination of SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing)/DWS (Dynamic Web Scanning) technology. And if that's the case--it's time for you to rethink your application security roadmap.

By Johna Till Johnson
On Oct 21, 2015

Trend Micro Acquires Tipping Point

Wednesday, October 21, 2015

Today Trend Micro announced its intent to acquire the TippingPoint division of HP, acquiring its technology, staff, intellectual property and network of 2300 customers, largely in the US. The move will position Trend well in the US--a geography in which the company has been relatively weaker, compared with its position globally.  Tipping Point also includes a strong relationship with the US Fed, which Trend will acquire.

By Johna Till Johnson
On Sep 18, 2015

Beyond the Yellow Brick Road: Hibernia Goes Back to the Plow

Friday, September 18, 2015

Blame Elton John.

Hibernia Networks recently announced  Hibernia Express, an undersea cable that  the company claims is the lowest-latency, highest-capacity link between NYC and London, with a measured latency of just 59.5 ms.

By Johna Till Johnson
On Sep 15, 2015

It's All About the Digital Enterprise: Notes from BMC Engage

Tuesday, September 15, 2015

ITSM is dead, long live the Digital Enterprise. That’s the news from last week’s BMC Engage event in Las Vegas.

Okay, not really.

As one of the companies that’s pioneered IT Service Management (ITSM), BMC would hardly pronounce its demise. But the company has shifted its focus and emphasis to what’s arguably the next generation of ITSM: managing, optimizing, and securing the digital enterprise.

What does that entail?

By Johna Till Johnson
On Aug 17, 2015

“Welcome to Acme Corp. You’ve Been Breached”

Monday, August 17, 2015

Incoming CISOs like to joke that the first item they’re issued when they begin the new job is a T-shirt with a target on it. But it’s not really a joke: for a long time, the CISO’s job was to be fired if a company was breached.

That’s no longer the case. For one thing, the drumbeat of breaches at high-profile companies makes it clear that even the most sophisticated companies can be victims.

By Johna Till Johnson
On Aug 03, 2015

Nemertes Navigator360 Conference Charts the IT Seas for 2020 and Beyond

Monday, August 3, 2015

For the fifth consecutive year, the Nemertes Navigator360 conference was a smashing success.  The Nemertes team, together with our Platinum sponsors Dimension Data and Sprint, and senior IT executives from Ford, Mars, Inc., Northrop Grumman, Pfizer,  Prudential and other leading global firms covered a lot of ground in 2.5 days: We explored emerging trends in unified communications, cloud services, DevOps, security and risk management.

By Johna Till Johnson
On Jun 09, 2015

Cisco's Changing of the Guard

Tuesday, June 9, 2015
When Chuck Robbins succeeds John Chambers as CEO on July 26, what changes can competitors, partners, and IT professionals anticipate?
By Johna Till Johnson
On Mar 24, 2015

Managing Distributed Risk: A Strategy for Minimizing Risk from Third-party Engagement

Tuesday, March 24, 2015

If you’re like most IT professionals, you’ve noticed that your roster of third-party providers continues to grow. Whether you’re using software as a service (SaaS) applications (as virtually every organization does), offshore developers, cloud services like infrastructure as a service (IaaS) or platform as a service (PaaS), or document share solutions, you probably have a surprising amount of sensitive data in the hands of third parties. And that injects distributed risk.


Subscribe to RSS - Johna Till Johnson's blog