St. Bernard Software makes first acquisitionRemember when I blogged about St. Bernard Software?October 4, 2006 by Richard Stiennon in Collaboration
More partnerships in the data protection spaceI mentioned last week that the face of data protection was changing. This week and next will there are even more announcements.October 3, 2006 by Richard Stiennon in Big Data
Buying a competitor's brandI am not sure I agree with the judge that just ruled that it is not a copyright infringement to purchase Google adwords that key off a competitor's name or product. The free market argument would be "go for it" pay $.September 30, 2006 by Richard Stiennon in Google
Leak prevention entering the next phaseOK, the experimental phase is over in the nascent leak prevention space. Many security companies launch in response to a problem.September 26, 2006 by Richard Stiennon in Security
Enemy at the water coolerI just read Brian Contos’ new book “Enemy at the water cooler”. It is a compilation of his war stories from the field regarding security.September 25, 2006 by Richard Stiennon in Security
Trojans represent over 60% of all malwareI just got done recording a podcast with Richard Wang, Director of Threat Research for Sophos. He and I are going to be presenting at a breakfast seminar in Boston next week on the topic of cyber crime and why you should worry about it.September 21, 2006 by Richard Stiennon in Security
Cyber crime scenarioI am heading to Boston next week. If you want to meet up drop me a line.September 19, 2006 by Richard Stiennon in Hardware
Welcome EMC!Today EMC announces the completion of their acquisition of RSA, fully joining the ranks of big security players. What I like most about this acquisition is that it was accompanied by a well articulated plan to create a business around protecting data and the infrastructure that contains it.September 17, 2006 by Richard Stiennon in EMC
Michael Haephrati respondsI received the following email from Michael Haephrati, the creator of the Trojan that was used by Israeli Private Investigators to steal confidential information from dozens of companies. Michael provides a completely different perspective on the entire drama from any of my previous coverage.September 13, 2006 by Richard Stiennon in Legal
Juniper + Symantec: Two bumbling giants reacting to marketing hypeI am sitting on the Juniper-Symantec conference call listening to the two CEO's fling jargon and overused-hype. They talk about their "best-in-class" solutions while criticizing so called "point solutions".September 12, 2006 by Richard Stiennon in Security
Chair ball at HPMy experience with corporate boards and strategy always reminds me of Dave Barry's depiction of the journalist staff at the Miami Herald: a bunch of childish guys zooming around the board room on roller chairs trying to dunk a wad of paper in the trash can. Boards and executives are just like the rest of us.September 11, 2006 by Richard Stiennon in Hewlett Packard Enterprise
Where is Stiennon?Periodically I use my blog to give a heads up on my location. Feel free to ping me if I am passing through your coordinates and you want to meet up!September 10, 2006 by Richard Stiennon in Security
Auditing auditorsThe frequent loss of laptops and data disks by outside auditors in recent months has caused me to think about best practices for controlling auditors. The latest case involved the laptop of the auditor for Wellsfargo Bank.September 8, 2006 by Richard Stiennon in Big Data
Chambers on stageFrom John Chambers' position, the tippy top height of the largest player in networking, Cisco, the future looks pretty good. His perspective gives him the ability to prognosticate on big issues.September 6, 2006 by Richard Stiennon in Cisco
Holistic SecurityTo give you a quick feel of the content at the Security Standard event in Boston this morning just think holistically. That is the watchword for at least the first two presentations.September 5, 2006 by Richard Stiennon in Security