Author: Johna Till Johnson

On January 6, 2020, NYC-based private equity firm Insight Partners acquired the Israeli IoT cybersecurity  firm Armis for an eye-popping $1.1 billion. Armis is privately held, so it doesn't publish revenue numbers, but estimates are on the order of $30 million annually--meaning this is not only...

Last week I wrote about the threat that nation-state actors pose to enterprise organizations, and included a brief taxonomy of attackers. This week, the FBI alerted cybersecurity folks of two compromises, likely by APT27, in 2019. I'd like to highlight two interesting facts about the attacks. First, they...

When I talk about the cybersecurity threats posed by nation states, I can almost see the inner eye-roll, and hear my listener thinking, "Come on! What's she going on about now?" They view the entire issue as something out of science fiction; scary in some alternate...

Industrial IoT processes increasingly base IoT implementations on the ISA-95 standard, which means organizations must understand what the standard does and doesn't define. Anyone involved in developing industrial IoT (IIoT) products should be familiar with ISA-95, the standard from the 74-year-old International Society of Automation (ISA),...

If your organization is moving to cloud, you're not alone. In our most recent Cloud and Cybersecurity research study, we note that 2019 is "the year of cloud". Specifically, 56% of workloads are now in cloud, versus 44% on prem, either within data centers, or...

Should you outsource your SOC? As in so many things, the answer depends. In our most recent Cloud and Cybersecurity research study, we looked at which factors correlated to a cybersecurity organization's success, as measured by Mean Total Time to Contain (MTTC) security incidents.  We divided...

We spend a lot of time at Nemertes nailing down the metrics that define "success" for a particular initiative. To be useful, a success metric must be: Quantitative. If you can't measure it in numbers, it doesn't serve to measure progress. And if it's not something...

When it comes to cybersecurity, what differentiates highly successful enterprise technology organizations from their less successful counterparts can often be found in the metrics. Extremely effective cybersecurity organizations can detect a potential attack, determine whether it is or isn't an attack, and contain the damage...

A new Nemertes survey shows enterprises need to adopt third-party risk management programs that jettison manual checklists in favor of automated tools, hands-on risk assessments and dedicated risk teams. It's hardly news that the enterprise technology paradigm has shifted from on premises to cloud plus mobile....

Having a clearly defined IoT architecture framework greatly improves the chances for success of an enterprise's connected deployment. If your company is like many organizations, it's actively engaged in or considering launching one or more IoT initiatives. It has a goal, a strategy and a desired...

Bellwether cybersecurity technologies -- advanced endpoint security, behavioral threat analytics and a trio of cloud-based apps -- are used by successful cybersecurity teams. Find out why. When it comes to cybersecurity, what differentiates highly successful enterprise technology organizations from their less successful counterparts can often be...

Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT. ...