"52% of security professionals said that the biggest factor shaping their organization’s network security strategy was, “preventing/detecting malware threats.” This aligns with the CISO’s focus on security efficacy from a risk management and incident detection/response perspective."
What that tells me is that CISOs are focusing on protecting themselves from the outside. But the fact remains that many breaches are the result of something internal, social engineering, leaving server tapes unguarded, etc.
- SolarWindsHead Geek, 2013 - present
- Confio SoftwareTechnical Evangelist, 2010 - 2013
- Database professionals.
- Technology enthusiasts.
- SQL Server.
- Technical evangelists.
- Bacon lovers.
- Social media.
- Bloggers (especially geeky or tech).
- iPhone enthusiasts.
- Weird dudes.
I am also a Microsoft Certified Master, a SQL Server MVP, a VMWare vExpert, and a Microsoft Certified Trainer. I have over 15 years experience in the IT industry in various roles such as programmer, developer, analyst, and database administration.
I also serve on the Board of Directors for the Professional Association for SQL Server, an independent, not-for-profit association, dedicated to supporting, educating, and promoting the Microsoft SQL Server community member.
- Washington State UniversityMS, Mathematics
- Merrimack CollegeBA, Mathematics
Factors Shaping Network Security at Enterprise Organizations | Network W...
CISOs want network security that delivers security efficacy, operational efficiency, and business enablement
Geek Speak: Balanced Scorecards for the DBA | thwack
Network Performance Monitor Content. Customizations and Extensions · General · Reports · Universal Device Pollers. Network Configuration Man
Holiday Pairings with DBMSs & Datastores – Part I | InfoAdvisors'...
It's the Wednesday before Thanksgiving weekend in the US and the rest of the world is thinking about how much MORE WORK we are going to acco
Characteristics of a Great Enterprise Data Modeler, Part I - DATAVERSITY
Do you have the traits of a great enterprise data modeler? Do you know how to assess them? Karen Lopez discusses what to look for.
Geek Speak: There is No New Thing Under the Sun... | thwack
Meanwhile, today's security teams are grappling with the “any-to-any problem”: how to secure any user, on any device, located anywhere, acce
Poll: How many cores for your database server? | thwack
WorldLingo, the worlds leading online translation company. www.worldlingo.com · thwack - The Community of SolarWinds - Welcome Home. of Sola
Geek Speak: When Performance Optimization Matters | thwack
Performance in virtual world is complex. But it's one of the most important topic as well! Every admin I meet puts performance on the first
SQL Server 2014: New Datatype | InfoAdvisors' Blog
News about a new datatype in SQL Server 2014. Do you know the properties of spacetime?
Is College for Everyone? Part II: The Pros and Cons of Attending a 4-Yea...
Welcome to Part II of our series that asks the question of whether or not college is necessary. In Part I, we took a look at the history of
Sexed-up science news - reporting the story gets in the way of a good fact
Last week saw a backlash against tabloid-style “sexing-up” of science reporting. Although incorporating a sexual angle may be a reliable way
Could everyone marry a supermodel? A scientific assessment
Marrying a supermodel is viewed by some as the pinnacle of achievement when it comes to relationships. But could everyone do that? And would
Is College for Everyone? An Introduction and Timeline of College in America
"A college education unfits rather than fits men to affairs." –Andrew Carnegie, 1901 Over one hundred years ago, one of the richest and most