Articles

  • Sep 18, 2024 | techtarget.com | Jon Oltsik

    Organizations understand vulnerability management is essential to identifying cyber-risks, but coordinating teams, tools and handling CVEs keeps the pressure on. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers. Published: 18 Sep 2024 Many organizations struggle with collaboration, tools integration, keeping up with vulnerability volume and prioritizing remediation actions. Time is not on their side.

  • Sep 11, 2024 | techtarget.com | Jon Oltsik

    With organizations' attack surfaces growing, new research shows better asset management, tighter access policies like zero trust and consistent configuration standards can help. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.

  • Sep 9, 2024 | techtarget.com | Jon Oltsik

    Strong cyber-risk management demands collaboration and coordination across business management, IT operations, security and software development in an ever-changing environment. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.

  • Aug 28, 2024 | techtarget.com | Jon Oltsik

    While SecOps has become easier in some ways, enterprises still struggle with areas such as data volumes, threat intelligence analysis and security alert volume and complexity. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.

  • Jul 26, 2024 | techtarget.com | Jon Oltsik

    Cyber-risk management is simple in concept and difficult in practice. CISOs weigh in on some potential ways to reign in the chaos, educate executives and mitigate cyber-risks. ByJon Oltsik,Analyst EmeritusEnterprise Strategy GroupWe provide market insights, research and advisory, and technical validations for tech buyers.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
3K
Tweets
4K
DMs Open
No
Jon Oltsik
Jon Oltsik @joltsik
31 Mar 25

Here's a link to my podcast, the cybersecurity bridge, with guest, Greg Bell from @corelight_inc. We discuss the present and future of network security. https://t.co/5A2t6BTnud #cybersecurity #infosec #networksecurity #corelight

Jon Oltsik
Jon Oltsik @joltsik
24 Mar 25

On the next episode of my podcast, the cybersecurity bridge, we'll be discussing the present and future of network security -- and how we get from here to there. #cybersecurity #infosec #networksecurity #thecybersecuritybridge #bro #zeek

Jon Oltsik
Jon Oltsik @joltsik
24 Mar 25

Many thanks to Demetrios Lazarikos (aka "Laz") for joining me as a guest on the cybersecurity bridge podcast. Here's a link to the podcast on YouTube. It is also available on your favorite podcast outlet. https://t.co/b03FkL9z7x #cybersecurity #infosec #AI #CISO #Laz