Author: Johna Till Johnson

[caption id="attachment_4442" align="alignleft" width="300"] Not just a box: Firewall, router, SD-WAN, and WAN optimizer![/caption] AT&T's Universal CPE It’s always fun seeing something you’ve helped with reach fruition. So I was thrilled yesterday at the AT&T Summit to finally see the universal CPE (uCPE) device. AT&T has made...

You've got firewalls, anti-malware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together? This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should...

Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they...

Securing IoT isn't exactly like securing any other aspect of your infrastructure--but neither is it entirely different. Most companies, even leading-edge ones, are just beginning to figure this out, and are still struggling with putting in place an IoT security architecture, best practices, and framework. This...

In January, I was delighted to have the opportunity to moderate a panel session on emerging technologies for the Wall St. Technology Association.  Nemertes does quite a lot of work with the WSTA, which is a networking and educational consortium serving (as you might expect)...

Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity. During this webinar we: Showcase the battle-tested strategies of the most successful information security organizations Survey the landscape of analytics-based security tools and solutions Walk through how to build a strategy based around current (and...

In today's cybersecurity environment, it's not if you'll be breached, it's when. Do you know how to respond to minimize damage, maintain brand strength, and shut down the intruders? This interactive Webinar walks participants through a step-by-step process for crafting an effective cybersecurity incident response...

HBO has confirmed that the company's internal sites have been broken into, and  that proprietary information (including reportedly scripts of upcoming episodes of the hit series "Game of Thrones") have been seized. According to an article in Variety, “HBO recently experienced a cyber incident, which...

There's been a lot of buzz around Amazon's acquisition of Whole Foods. The upshot? Most pundits conclude that Amazon wants to enhance its ability to offer groceries online. That may be true, but we think it's far from the whole story. Our view is that Amazon's purchase...

The Internet of Things (IoT) is one of the foundational technologies enabling Digital Transformation. But if you're like most organizations, you haven't even started to implement effective security for IoT. Find out the current state of IoT security from our hot-off-the presses benchmark and maturity...