
Jon Oltsik
Writer at Freelance
Distinguished analyst and fellow at the Enterprise Strategy Group.
Articles
-
Sep 18, 2024 |
techtarget.com | Jon Oltsik
Organizations understand vulnerability management is essential to identifying cyber-risks, but coordinating teams, tools and handling CVEs keeps the pressure on. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers. Published: 18 Sep 2024 Many organizations struggle with collaboration, tools integration, keeping up with vulnerability volume and prioritizing remediation actions. Time is not on their side.
-
Sep 11, 2024 |
techtarget.com | Jon Oltsik
With organizations' attack surfaces growing, new research shows better asset management, tighter access policies like zero trust and consistent configuration standards can help. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.
-
Sep 9, 2024 |
techtarget.com | Jon Oltsik
Strong cyber-risk management demands collaboration and coordination across business management, IT operations, security and software development in an ever-changing environment. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.
-
Aug 28, 2024 |
techtarget.com | Jon Oltsik
While SecOps has become easier in some ways, enterprises still struggle with areas such as data volumes, threat intelligence analysis and security alert volume and complexity. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.
-
Jul 26, 2024 |
techtarget.com | Jon Oltsik
Cyber-risk management is simple in concept and difficult in practice. CISOs weigh in on some potential ways to reign in the chaos, educate executives and mitigate cyber-risks. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 3K
- Tweets
- 4K
- DMs Open
- No

Here's a link to my podcast, the cybersecurity bridge, with guest, Greg Bell from @corelight_inc. We discuss the present and future of network security. https://t.co/5A2t6BTnud #cybersecurity #infosec #networksecurity #corelight

On the next episode of my podcast, the cybersecurity bridge, we'll be discussing the present and future of network security -- and how we get from here to there. #cybersecurity #infosec #networksecurity #thecybersecuritybridge #bro #zeek

Many thanks to Demetrios Lazarikos (aka "Laz") for joining me as a guest on the cybersecurity bridge podcast. Here's a link to the podcast on YouTube. It is also available on your favorite podcast outlet. https://t.co/b03FkL9z7x #cybersecurity #infosec #AI #CISO #Laz