How Bellwether Cybersecurity Technologies Predict Success

By | April 16th, 2019|Blog, Security and Risk Management|

Bellwether cybersecurity technologies -- advanced endpoint security, behavioral threat analytics and a trio of cloud-based apps -- are used by successful cybersecurity teams. Find out why. When it comes to cybersecurity, what differentiates highly successful enterprise technology organizations from their less successful counterparts can often be found in the metrics. Extremely effective cybersecurity organizations can [...]

Webinar Replay – IoT Series [Ep.3]: IoT Essentials — Selecting a Vendor

By | |Webinars, Security and Risk Management, Internet of Things (IoT)|

Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT. Who are the right providers? What are the critical factors [...]

Webinar Replay – IoT Series [Ep.2]: Current State — Maturity and Success

By | |Webinars, Security and Risk Management, Internet of Things (IoT)|

Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics? This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. [...]

Webinar Replay – Disruptive Technologies: A Quarterly Update

By | |Webinars, Cloud and Networking, Digital Transformation, Security and Risk Management, Internet of Things (IoT)|

Quantum computing. Quantum cryptography. What are they? Find out why vendors like IBM, Microsoft, Intel, and others are placing a bet on these technologies, and what they mean for enterprise technology. Join Nemertes' CEO and resident futurist Johna Till Johnson for a quarterly update on these disruptive technologies.

Webinar Replay – IoT Series [Ep.1]: Foundations — Architecture and Framework

By | |Webinars, Security and Risk Management, Internet of Things (IoT)|

Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations. Nemertes CEO, Johna Till Johnson, reviews the IoT architecture and framework [...]

Webinar Replay – Next-Generation Security: Containers

By | |Webinars, Security and Risk Management|

Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development. But are they taking the right steps to secure those containers? This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in [...]

Webinar Replay – Crafting a Next-Generation Enterprise Architecture

By | |Webinars, Cloud and Networking, Security and Risk Management|

Enterprise Architecture is dead. Long live Enterprise Architecture! In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed, inflexible architecture. Next-generation Enterprise Architecture needs to be fast, [...]

Webinar Replay – Taking an Operational Approach to Next-Generation Security

By | |Webinars, Security and Risk Management|

You've been breached. Now what? You may think you know the answer, but in this cloud-first, mobile-first environment, it's time to rethink your incident response policy. This webinar covers how to modify your security operations to take into consideration your next-generation security architecture and protect assets wherever they reside: on prem, in the cloud, or [...]

Webinar Replay – Making the Move to Cloud, Securely

By | |Webinars, Cloud and Networking, Security and Risk Management|

Your company's adopted a cloud-first strategy. Your DevOps initiative is steaming along, and your processes are lean and agile. But how well are you protecting cloud-based resources? Do you even know what's in the cloud, and who has access to it? Using Nemertes' real-world data, find out from the most successful organizations how to implement [...]

Super Micro Spy Chip Hack: How Real?

By | October 6th, 2018|Blog, Security and Risk Management|

The Supermicro chip Source: Bloomberg Should you be worried about the Chinese Supermicro spy chip revelations? In a nutshell, yes. If you're among the organizations using Supermicro server boards: Run, do not walk, to your server rooms and examine the boards in minute detail. And regardless of what server hardware you use, it's [...]