Doug Cahill (@dougcahill) 's Twitter Profile
Doug Cahill

@dougcahill

6X Tech Startup Exec and now SVP of Analyst Services at TechTarget's Enterprise Strategy Group. Family, outdoors, and live music. Opinions are mine.

ID: 57427995

calendar_today16-07-2009 19:52:15

495 Tweet

792 Takipçi

369 Takip Edilen

Doug Cahill (@dougcahill) 's Twitter Profile Photo

A hearty congrats to the great team at Signal Sciences and Fastly! Some acquisitions make more sense than others, this is one of those. #cybersecurity #cloudsecurity #DevSecOps

Doug Cahill (@dougcahill) 's Twitter Profile Photo

Great Q. Sure, keep 'em in place to secure your on-prem environment, but cloud requires retooling with controls which integrate into the CI/CD toolchain, can drive policy off metadata like tags, and more. #cloudsecurity

Doug Cahill (@dougcahill) 's Twitter Profile Photo

Can a mature secure DevOps program actually accelerate the delivery of new builds to production? New Cisco sponsored Enterprise Strategy Group research allows project teams to benchmark their #DevSecOps maturity. bit.ly/3gSmnV9 #cloudsecurity #cybersecurity Cisco Security Splunk AppDynamics

fsmontenegro.bsky.social (@fsmontenegro) 's Twitter Profile Photo

To InfoSec vendors out there: there’s a VERY fine line between educating your customers about SUNBURST and, in practice, performing the worst ambulance chasing practices so many of us despise. Tread carefully. #analystlife #archat

Doug Cahill (@dougcahill) 's Twitter Profile Photo

Good fun chatting about #cloudsecurity with David Spark and Mike Johnson on this episode of the #CISOseries. Love this podcast and was thrilled to be asked to join. #cybersecurity #devsecops

Doug Cahill (@dougcahill) 's Twitter Profile Photo

This recent report from Cybersecurity and Infrastructure Security Agency highlights the need for better #cloudsecurity hygiene to thwart the phishing of privileged cloud credentials and more, issues surfaced in Enterprise Strategy Group's recent #identityandaccessmanagement research #cybersecurity bit.ly/3bGjINB

Doug Cahill (@dougcahill) 's Twitter Profile Photo

Interested in the industry analyst view of the dynamic #cybersecurity market? We’re hiring – contact me if you’re interested in learning more.

Doug Cahill (@dougcahill) 's Twitter Profile Photo

#kubernetes is the cloud-native application operating system making protecting K8 clusters critical. Kudos to all on this news! #cybersecurity #cloudsecurity

Doug Cahill (@dougcahill) 's Twitter Profile Photo

Leveraging #APM #observability for #cybersecurity #appsec use cases makes a ton of sense and it starts with a collaborative approach that leads to #devsecops maturity.

Doug Cahill (@dougcahill) 's Twitter Profile Photo

It's great to see so many advances as of late to make #MFA frictionless and thus, hopefully, more broadly adopted, en route to I Have A Dream. Akamai Technologies #IAM prn.to/30OuRFI

Doug Cahill (@dougcahill) 's Twitter Profile Photo

24 cyber professionals and me spotlight 30 of the greatest myths of cloud security in this article by David Spark of CISOseries. cisoseries.com/debunking-30-e… #cloudsecurity #devsecops #CyberSecurity

Doug Cahill (@dougcahill) 's Twitter Profile Photo

Colleague Carla Roncato Bernadette Hänel-Förster📤♏🕒 offers an indentirati perspective ahead of #RSAC 2021 rightfully highlighting the central role of identities in #CyberAttack chains bit.ly/2Rhtga5

Jon Oltsik (@joltsik) 's Twitter Profile Photo

Summary of the XDR evaluation from another analyst firm: 1) We define the category, 2) We make the rules, 3) We choose the contestants, 4) We do some cursory research, 5) We call the winners and losers. Huh? #cybersecurity #infosec #XDR #EDR #SIEM #SOAPA

Jon Oltsik (@joltsik) 's Twitter Profile Photo

At this year's RSAConference, Candy Alexander, president of ISSA International and I will present on new research, detailing cybersecurity professionals' opinions about technology, vendors, and the industry. Joins us! rsaconference.com/USA/agenda/ses… #cybersecurity #infosec #ESG #RSAC #RSAC2022

Jack L. Poller (@poller) 's Twitter Profile Photo

Jon Oltsik Good points, Jon. Last 5 yrs we've adopted zero trust. CISOs: understand that you can't trust if you can't authenticate & authorize human & machine entities The George Washington CISOs need to shift their perspective & adopt a new mindset: Identity is the core of cybersecurity