Author: Johna Till Johnson

Last week my colleague Irwin Lazar and I attended the Slack Frontiers conference in NYC. We both walked away impressed. Sure, we've been Slack fans since Nemertes moved on to the platform in 2016. And Irwin consistently hears good things about the platform in his research...

You've been breached. Now what? You may think you know the answer, but in this cloud-first, mobile-first environment, it's time to rethink your incident response policy. This webinar covers how to modify your security operations to take into consideration your next-generation security architecture and protect assets...

Your company's adopted a cloud-first strategy. Your DevOps initiative is steaming along, and your processes are lean and agile. But how well are you protecting cloud-based resources? Do you even know what's in the cloud, and who has access to it? Using Nemertes' real-world data, find...

Should you be worried about the Chinese Supermicro spy chip revelations? In a nutshell, yes. If you're among the organizations using Supermicro server boards: Run, do not walk, to your server rooms and examine the boards in minute detail. And regardless of what server hardware you use,...

[caption id="attachment_4456" align="aligncenter" width="300"] DevOps is Coming! In character as Paul Revere. Photo by WSTA[/caption] Last month I presented the keynote at an afternoon seminar on Enterprise Architecture held by the Wall St. Technology Association (WSTA). I also moderated a panel session on the topic. Other presenters and...

[caption id="attachment_4442" align="alignleft" width="300"] Not just a box: Firewall, router, SD-WAN, and WAN optimizer![/caption] AT&T's Universal CPE It’s always fun seeing something you’ve helped with reach fruition. So I was thrilled yesterday at the AT&T Summit to finally see the universal CPE (uCPE) device. AT&T has made...

You've got firewalls, anti-malware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together? This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should...

Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they...

Securing IoT isn't exactly like securing any other aspect of your infrastructure--but neither is it entirely different. Most companies, even leading-edge ones, are just beginning to figure this out, and are still struggling with putting in place an IoT security architecture, best practices, and framework. This...

In January, I was delighted to have the opportunity to moderate a panel session on emerging technologies for the Wall St. Technology Association.  Nemertes does quite a lot of work with the WSTA, which is a networking and educational consortium serving (as you might expect)...

Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity. During this webinar we: Showcase the battle-tested strategies of the most successful information security organizations Survey the landscape of analytics-based security tools and solutions Walk through how to build a strategy based around current (and...