Stories by Rob Enderle

Rob Enderle's image

Security threats and why you never want to name anything

There is a bit of a name fight going on with a new class of security software. Traditionally, this has been called UBA, for User Based Analysis or Analytics. However, recently newer firms are coming to market arguing that the name should have more to do with the benefit the technology provides and reflect that the breadth of analysis goes well beyond users. Thus, you have ABD, or Active Breach Detection, and this could as easily be DBD, or Dynamic Breach Detection, or even SJIASSFYCAWCTYWTAAWTAS or Some Jerk Is Already Stealing Stuff From Your Company And We Can Tell You Who They Are And What They Are Stealing.

Rob Enderle | 04 Jul | Read more

How to stop the security breach tsunami

It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.

Rob Enderle | 20 Jun | Read more

U.S. surveillance programs are killing the tech industry

The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.

Rob Enderle | 13 Jun | Read more

Lessons learned from the Apple-Google privacy fight

One of the fascinating things about the last decade was the iPhone. We had a market dominated by companies like Palm, RIM, Nokia and Samsung. Each was incredibly powerful in its segment and two were massive multinationals. But, despite all that, Apple walked in and cut through them like a knife through butter.

Rob Enderle | 06 Jun | Read more

Everything you know about enterprise security is wrong

Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at the RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access - you have to rethink all types to security to protect data and lives.

Rob Enderle | 28 Feb | Read more

McAfee Offers Global Response to Nationalized Malware

In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.

Rob Enderle | 21 Feb | Read more

McAfee Moves to Redefine SIEM, Enterprise Security

Most security information event management systems can identify threats, but they can't remove them. All this does is put a bull's eye on a CIO's back. McAfee's new Enterprise Security Manager takes that next step and shows enterprises how to respond to those threats.

Rob Enderle | 04 Oct | Read more