You are here

Blogs by Alissa Knight

November 7, 2019

The butterfly effect, a concept originating in chaos theory, describes how small changes can have a nonlinear impact on a complex system, such as the flap of a butterfly's wings causing a typhoon thousands of miles away.

April 24, 2019

At this year's RSAC, I sat down in 49 vendor briefings, each of which lasted 30 minutes, from Monday to Friday. So if you think, "Why should I believe Alissa when she tells me about the takeaways from this year's RSA?" Well ... in the memorable words of Bill Engvall, "Here's your sign."

If the show floor at RSAC is in any way indicative of the overall trends we'll see in cybersecurity controls in 2019, then I pretty much nailed it in my Aite Group report Top 10 Trends in Cybersecurity, 2019: User Experience and Machine Learning.

The words I'd use to describe the cybersecurity trends in 2019 and takeaways from this year's RSAC are “automation,” “AI,” “data,” “removing the human,” and “frictionless.”

April 23, 2019

Security information and event management, or SIEM—once upon a time referred to as SEM (security event management), SIM (security information management), SIM/SEM, or (insert your preferred acronym here)—is a category of software that surfaced in the late '90s with Intellitactics (1996), netForensics (1999), Arcsight (2000), Q1 Labs (2001), LogRhythm (2003), and Splunk (2003). SIEM solutions would offer hope to security analysts looking to aggregate and correlate all of the log and other event information from different servers and devices on their network in a single place.

February 12, 2019

It was 2010 when John Kindervag, then an analyst with Forrester Research, first wrote about the idea of a zero-trust security framework in which the idea of a network edge or perimeter was no longer the front lines of the cyber battlefield for an organization.

Pages