Tag: security

BMC today announced new capabilities aimed at security, facilitating a modern development experience, and promoting an open, collaborative mainframe. Futurum analyst Steven Dickens shares his insights on the relevance and timeliness of these capabilities as well as what’s ahead.
Futurum’s Steven Dickens analyzes first half 2021 results for Micro Focus and finds encouraging news on the company's strategic focus on three year back end transformation and the forging of encouraging partnerships. Micro Focus is focused on explosive growth areas of the market so should be one to watch as they continue to deliver on operational execution.
Futurum Senior Analyst Steven Dickens provides his take on news coming out of HPE’s Discover event around the latest zero-trust solution, Project Aurora. As the cybersecurity landscape evolves, new approaches are required to combat the emerging threats. HPE’s zero-trust approach is designed to deliver robust attestation and verification derived through a root-of-trust model at the silicon layer.
Futurum’s Daniel Newman takes on the fear mongering that’s dominated the media about Amazon Sidewalk in the simplest of terms: it’s a big, fat nothing burger. Here’s why.
In this newest episode of the Futurum Tech Webcast, Cybersecurity Shorts series, analysts Shelly Kramer and Fred McClimans discuss nuances of the Colonial Pipeline attack and how the weakest link can take down the whole system, DarkSide’s Ransomware-as-a-Service offering, DarkSide’s servers being taken out, the Biden administration’s Executive Order aimed at hardening the Fed’s cybersecurity defenses, and the unusual act of the FBI and its court-ordered mitigation of Microsoft Exchange servers impacted by the recent hack.
We believe that with AWS entering the Confidential Computing space, the bigger message here is that Big Tech is increasingly addressing data security in novel and important ways by addressing the entire data chain to ensure that organizations are able to pass on that security to their customers. We expect big things ahead in the Confidential Computing space and AWS, as always, is on the forefront.
In this quick vignette from the Futurum Tech Webcast Cybersecurity Shorts series, Futurum analysts Shelly Kramer and Fred McClimans discuss the China-linked hack of the Pulse Connect VPN and the targeting of a multitude of federal civilian agencies and financial institutions.
In this new series for the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans focus exclusively on cybersecurity, in a series we’re calling Cybersecurity Shorts. They’ll be tacking six cybersecurity topics in quick succession each week and if you’re in the cybersecurity business, this is one show you’ll want to be sure is on your radar screen.
In this new episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman go further into their multi-part series on Confidential Computing, and how vendors are looking to deploy trust-based computing models — and why that makes perfect sense. This conversation series is a precursor to our soon-to-be-published research brief on the topic of Confidential Computing, and if enterprise security is your thing, probably a don’t-miss conversation.
In this new episode of the Futurum Tech Webcast, Interview Series, the topic is all about security, and specifically focused on the role hardware plays in the enterprise security journey. Futurum’s Shelly Kramer is joined by Dell Technologies’ Rick Martinez and John Boyle for an insightful discussion centered on the four key insights we uncovered as a result of a recent research study, as well as a look at supply chain and how that’s been impacted in the last year, what executives can do to prepare their businesses for the current threat landscape, as well as looking to the future.
In this episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman tackle the thorny topic of cybersecurity and the fact that security breaches are frequent, inevitable, expensive, and risky. Security has been a foundational layer within IT since the beginning of time, but it’s clear that it’s not working. There are many factors that contribute to this, and there are some nascent technology solutions, like Confidential Computing, that we think are going to play an important role in the not too distant future. This is one of a series of conversations we’ll have on this topic, and we’ve got a soon-to-publish research paper on the topic of Confidential Computing that you won’t want to miss.
Microsoft has confirmed a significant security breach of its Exchange email servers and the theft of private emails from businesses, organizations, and government agencies around the world. Futurum’s Fred McClimans breaks down the timeline and what we know so far, and also discusses the behavior issue organizations face regarding on-premises systems.

Thank you, we received your request, a member of our team will be in contact with you.