Author: Johna Till Johnson

Everything is different now. That's true for all of us, as we cope with the enduring presence and lingering aftereffects of the Covid-19 pandemic. But it's particularly true for enterprise technologists, who are witnessing a once-in-a-generation set of paradigm shifts that are transforming how companies and...

The concept of threat-informed defense is near and dear to my heart, given that it aligns with three themes I've been preaching about for years: the importance of matching cybersecurity investments (in both technology and operations) with risk;  the value of aligning one's cybersecurity practices...

' IoT can be game-changing for organizations -- in more ways than one. In fact, organizations that successfully implemented IoT generated an average of $8.36 million in new revenue, $5 million in savings and 41.8% improvement in business process efficiency, according to our Nemertes Research IoT...

In my previous post, I pointed out that the Twitter hack was just an example of a phishing scam--the same old scam that's been around since the dawn of the Internet. The basic flaw is gullible (if smart) humans trusting people they shouldn't, for stupid...

  "Water, water, every where, nor any drop to drink." This line from Samuel Taylor Coleridge's The Rime of the Ancient Mariner could just as easily apply to CIOs seeking to fill crucial spots in their IT organizations. The world may seem full of systems engineers, network specialists...

The big news tonight is that Twitter was hacked, and the accounts of various celebrities (Elon Musk, President Obama, Warren Buffett, Kanye West, and many others) sent out bogus requests for Bitcoin to their followers. As of right now the damage is $10 million and...

As described in Security Magazine, "In recognition of the growing convergence of cyber and traditional financial crimes, the U.S. Secret Service is formally merging its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) into a single unified network, which will be known...

' The right IoT database depends on the requirements of each IoT project. The first step to select a database is to factor in critical characteristics of IoT when selecting among database architectures. IoT technologists must determine the types of data to be stored and managed; the data...

' When it comes to implementing IoT initiatives, tech leaders should internalize one key lesson: IoT infrastructure matters. A growing number of organizations adopt IoT to achieve new goals and improve established processes, which testifies to the advantages that the technology can provide. More than two-thirds of organizations...

The National Security Agency (NSA) recently issued a set of guidelines for configuring IPsec VPNs. You can read the guidelines here; the key points are the following: Reduce the VPN gateway attack surface Verify that cryptographic algorithms are Committee on National Security Systems Policy (CNSSP) 15-compliant ...

In Nemertes’ 2019-2020 IoT research study, we found that 68% of participants were in proof-of-concept (POC) or early production (less than 25% complete) stages of their IoT rollouts. Half of those expected both device counts and project counts to grow at 25% or more per...