Results for Phil Quade

Industry Trends

Executive Insights: The Future: It Ain't What It Used to Be

The problem with the future-as baseball legend Yogi Berra, the founders of the Internet, and any CISO or CTO can assure you-is that, increasingly, it ain't what it used to be.

By Phil QuadeMarch 12, 2018

Industry Trends | Business and Technology

Executive Insights: Using Artificial Intelligence to Rebalance the Cyber Criminal Advantage

Criminals and cyber adversaries use speed, stealth, and bots to achieve their singular goal—steal from you. But as the CISO, you must focus on two goals: Run your organization effectively and counter those adversaries. How might AI be used to fundamentally rebalance the field of play?

By Phil QuadeFebruary 27, 2018

For a moonshot, you need more than just the moon

At one time, we were challenged to ask not what our country could do for us but what we could do for our country. It is time that the leading organizations in digital technology come together once again to ask the same.

By Phil QuadeFebruary 07, 2018

Industry Trends

How Sutton’s Law Applies to Cybersecurity Today

In my previous article, I raised a red flag about the diminishing practical returns of “mom and pop” threat research as a proxy for mitigating vulnerabilities and bad consequences. Threat assessment is often both difficult and incomplete, and sometimes best left to those who have timely access to the best possible data (and the even then, left to those with the military and intelligence means to act on it). In that piece, I also begged an obvious question. If chasing threats are not the best allocation of an organization’s...

By Phil QuadeNovember 09, 2017

Industry Trends

Cloud Migration a Challenge to Many

The number one challenge identified by Federal agencies in migrating to the cloud is expanding security measures and policies to cover cloud environments. To date, confidence is hard to find. Only 35% of Federal IT leaders believe that the security of their existing private cloud environments is excellent, and this drops to 21% for public cloud. They have similar concerns for the security of data that has to move between physical and virtual environments.

By Phil QuadeOctober 24, 2017

Industry Trends

You Don’t Need a Weatherman to Know Which Way the Wind Blows

Over the past month, we have all watched with dismay as the islands of the Caribbean and coasts of Texas and Florida were hit with devastating rains and high-speed winds. In the days leading up to the storms’ landfalls, some of the most talented scientific minds deployed astounding levels of technology to assess and communicate the severity of the approaching threats—despite the fact that severe weather is notoriously unpredictable, with inherent uncertainty that makes truly accurate assessment of the threat nearly impossible. In...

By Phil QuadeOctober 20, 2017

Industry Trends

All Roads Lead to Rome: Critical Infrastructure Security at the Crossroad

Prosperous nations sometimes take for granted the safe and reliable critical infrastructures that underpin our economies, governments, and personal well-being.  Similar to how we marvel today at the Roman Empire’s aqueducts, the 3rd millennium will likely do the same with today’s critical infrastructures.  That is, if they don’t lead to our downfall. Our Strength, Our Weakness The common understanding of the phrase ‘all roads lead to Rome’ is that there are many different ways to reach a goal. ...

By Phil QuadeSeptember 29, 2017

Industry Trends | Business and Technology

Executive Insights: Securing Critical Infrastructure Takes a Village…and Automation

Malicious cyber activity targeted at the nation’s critical infrastructure – including water systems, transportation, energy, finance, and emergency services – are particularly worrisome because the interruption of those services can have devastating effects on our economy, impact the well being of our citizens, and even cause the loss of life.

By Phil QuadeAugust 16, 2017

Industry Trends

Executive Insights: Evolving Towards Intent-Based Security

In this second installment, begun with ”The Evolution of the Firewall,” we will take a look at the direction security is headed. From its humble beginnings, the firewall has evolved through several stages of development. Its latest incarnation, built on the legacy of its first two generations, implements the strategic pillars of Segmentation, Access Control, and Real-time analytics/action to realize intent-based network security. The Three Generations of the Firewall With the advantage of looking backwards in time, it’s now...

By Phil QuadeJuly 26, 2017

Industry Trends

Executive Insights: The Evolution of the Firewall

As the Internet and Digital Economy have grown up, the humble Firewall has continued to serve as their go-to security appliance. In this first of a two-part series, we will examine how, in spite of the evolution of the Firewall through a number of shapes, functions, and roles, it remains the security foundation for implementing the strategic pillars of Segmentation, Access Control, and Real-time analytics/action now and into the future. Change is a fact of life; what doesn’t change usually withers and dies. This is true for both the biological...

By Phil QuadeJuly 21, 2017