article thumbnail

Let’s talk about security culture!

Forrester IT

I am thrilled to introduce my most recent report, ‘Instill a Security Culture by Elevating Communication’. This is an update of my 2011 report “How To Market Security To Gain Influence And Secure Budget’. A different time called for a completely revamped report (read on to see what’s changed).

Security 265
article thumbnail

Former VMware exec Gillis resurfaces to run Cisco security business (again)

Network World

Industry veteran Tom Gillis, who left VMware in December, has returned to Cisco in a new but familiar role: senior vice president and general manager of Cisco’s Security Business Group. After that, Gillis founded cloud computing firm Bracket Computing, which was acquired by VMware in May 2018.

Vmware 163
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Have we nailed it? Or do we still need to talk about security communications?

Forrester IT

In 2011, I published a report on “How To Market Security To Gain Influence And Secure Budget”. I am now going through the process of refreshing this report, and it got me thinking: 1. What has changed in this space of security communications and influence since 2011?

Security 170
article thumbnail

Go read this feature on the 2011 RSA hack that redefined cybersecurity

The Verge

Wired has published an in-depth feature on the 2011 hack of security company RSA, in which hackers stole the so-called “crown jewels of cybersecurity,” the secret keys forming a “crucial ingredient” of its SecurID two-factor authentication devices. Illustration by Alex Castro / The Verge.

article thumbnail

The HP-Autonomy lawsuit: Timeline of an M&A disaster

CIO Business Intelligence

It went on an acquisition spree in the early 2000s, driving up its revenue, before being swallowed itself by Hewlett-Packard in 2011, in a deal that valued it at over $10 billion. May 2011: Autonomy sneaks in one last acquisition, of online backup service Iron Mountain Digital, for $380 million. 19, 2011, and Nov.

HP 105
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Application Software Security.

Security 278
article thumbnail

December 2011: GovCloud Moves From Policy to Law

Cloud Musings

Tuesday, December 27, 2011. December 2011: GovCloud Moves From Policy to Law. One in particular is their recommendation for a National Office for Cyberspace (NOC) and a new National Security Council Cybersecurity Directorate (NSCCD). December 30, 2010 - GovCloud Predicitons for 2011. NJVC Cloud Computing. GovCloud Daily.

Policies 105