In late February, California’s attorney general Kamala Harris released a breach report that you can find here. The report requires companies conducting business in the state of
With very few exceptions, most established business operate from the inside out. The business becomes focused on what’s core (manufacturing, processing, etc.) and they project that focus out to
Q. What does the Microwave, 3D Printing and Splunk all have in common? A. They are all technologies that have introduced a fundamental paradigm shift from the conventional ways of doing things.
There are inherent limitations to relying upon traditional Security Information & Event Management Systems or SIEMS, which are often overlooked that every organization must be made aware of.
The differences between Operational Intelligence (OI) and Business Intelligence (BI) can be confusing. Just the name, Business Intelligence sounds like Nirvana. Show of hands, who doesn’t want
Let me begin this post by first describing what machine data is. Machine data is essentially log file information. When engineers build systems (hardware or software), they usually incorporate
So much has been written about the US Government’s Health Insurance Exchange that I’m almost afraid to mention it. For this posting, I’m going to stay out of the political
Imagine this scenario – you just discovered that your IT systems have been hacked into. Even worse, after pouring over logs and conducting exhaustive analysis you discover that the data
A customer of mine has been doing some stunning leading edge things including: (1) leveraging their back-end SOA services, (2) exposing API’s to their Partners, and (3) integrating seamlessly with
What is OAuth? OAuth is an an emerging protocol for sharing information between applications without sharing passwords. Chances are good that you’ve already used Oauth but may not have been