Author: Johna Till Johnson

Bellwether cybersecurity technologies -- advanced endpoint security, behavioral threat analytics and a trio of cloud-based apps -- are used by successful cybersecurity teams. Find out why. When it comes to cybersecurity, what differentiates highly successful enterprise technology organizations from their less successful counterparts can often be...

Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT. ...

Quantum computing. Quantum cryptography. What are they? Find out why vendors like IBM, Microsoft, Intel, and others are placing a bet on these technologies, and what they mean for enterprise technology. Join Nemertes' CEO and resident futurist Johna Till Johnson for a quarterly update on...

Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development. But are they taking the right steps to secure those containers? This Webinar provides a feature-functionality comparison of the leading providers...

Enterprise Architecture is dead. Long live Enterprise Architecture! In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed,...

Last week my colleague Irwin Lazar and I attended the Slack Frontiers conference in NYC. We both walked away impressed. Sure, we've been Slack fans since Nemertes moved on to the platform in 2016. And Irwin consistently hears good things about the platform in his research...

You've been breached. Now what? You may think you know the answer, but in this cloud-first, mobile-first environment, it's time to rethink your incident response policy. This webinar covers how to modify your security operations to take into consideration your next-generation security architecture and protect assets...

Your company's adopted a cloud-first strategy. Your DevOps initiative is steaming along, and your processes are lean and agile. But how well are you protecting cloud-based resources? Do you even know what's in the cloud, and who has access to it? Using Nemertes' real-world data, find...

Should you be worried about the Chinese Supermicro spy chip revelations? In a nutshell, yes. If you're among the organizations using Supermicro server boards: Run, do not walk, to your server rooms and examine the boards in minute detail. And regardless of what server hardware you use,...

[caption id="attachment_4456" align="aligncenter" width="300"] DevOps is Coming! In character as Paul Revere. Photo by WSTA[/caption] Last month I presented the keynote at an afternoon seminar on Enterprise Architecture held by the Wall St. Technology Association (WSTA). I also moderated a panel session on the topic. Other presenters and...