Tag Archives : #security


ESG: Antivirus Usage Patterns Reveal Hints about Its Effectiveness  

InsightaaS: ESG is a Massachusetts-based analyst firm that offers a wide range of research and advisory services. Today’s featured post is based on a recent report published in the firm’s security and related services. In it, senior principal analyst Jon Oltsik looks at the relationship between how antivirus is purchased and used and how it […]

bigstock_The_Black_Bug_On_A_Laser_Disk_701057

????????????????????????????????????????????????????????????????????????????????????????????????????????

IT World Canada: Five steps to a zero-trust network  

InsightaaS: IT World Canada is the country’s leading IT trade publisher. It provides a “pulse of the industry” view that is valued by buyers and sellers alike, and also produces longer-format pieces on key IT issues. Today’s featured post is based on an interview with Forrester principal security analyst John Kindervag (who, parenthetically, was featured […]


CSO: Endpoint security trends for 2015 – What can we expect?

InsightaaS: “In theory, theory and practice are the same. In practice, they’re different.” Most people are familiar with this saying, which draws a line between what we might expect and what we are likely to encounter in the real world. It came to mind when I was reviewing a CSO piece entitled “Endpoint security trends […]

bigstock_Mobile_Phone_Security_3349538

Deloitte University Press: Building consumer trust

InsightaaS: ‘Tis the holiday season, and all through the net, except for security, the blogs are all quiet. Okay, that’s a weak rhyme and weaker takeoff on a classic line, but it’s true nonetheless: while email is slow and bloggers appear to be enjoying downtime, the security chatter is getting louder. As was noted in […]


CSO: What the Sony breach means for security in 2015

InsightaaS: The Sony hack is one of those ‘crossover’ events, an IT security breach that is so big and bizarre that people with no real interest in IT security are talking about it and its repercussions. What might this enhanced visibility mean to the practice of IT security in 2015? Expert/blogger Ben Rothke has published an […]