Throughout the year, you and your colleagues create "cool" PowerPoint slides for use in webinars, road shows, and internal training sessions. Your sales reps will…

Blog
Too many high-tech hardware vendors leave piles of cash on the table by ignoring their competitors' end-of-life (EOL) announcements. When a hardware device has reached…
Many high-tech vendors are able to generate win/loss reports from their CRM system (e.g., Salesforce.com), but they rarely pass the "sniff test." In other words,…
Continuous automated threat removal, active breach detection, applied intelligence, machine learning, behavioral analytics, shadow IT, agentless integration, advanced next-generation threat (you pick it) detection /…
CyberEdge Group’s second annual Cyberthreat Defense Report surfaced a number of emerging areas of interest that we believe will warrant close attention from IT security…
The following infographic summarizes key results from our 2015 Cyberthreat Defense Report. To download the full report, visit https://cyber-edge.com/cdr-2015.
In part 1 of our 2015 Cyberthreat Defense Report blog, next-generation endpoint defenses and threat intelligence services were introduced as two emerging areas of interest…
Palo Alto Networks’ acquisition of Cyvera earlier this year got me thinking about the evolution of endpoint defenses. It’s been obvious for quite some time…
Detecting threats, especially new/unknown ones, will always be an imperfect science. That said, it appears the latest generation of threat detection technologies has been doing…
Somewhat overshadowed by the Verizon Data Breach Investigations Report, which also came out in April, the fifth-annual M-Trends® report from Mandiant® (a FireEye company) provides…
Like its predecessors, the 2014 Verizon Data Breach Investigations Report (DBIR) is a treasure trove of real-world information about the cyberthreat landscape. A big change…
Once again, I made the pilgrimage to San Francisco for the RSA Conference (Feb 24-28). In many ways, the 2014 edition was the same as…