By using this site, you agree to the IDC Privacy Policy

Compliance Team

Sean Pike

Program Vice President, Security Products

New Research

Facebook CEO Mark Zuckerberg's answers during his testimony before Congress were just pulp. The real intrigue was the content of questions from lawmakers, on both sides of the aisle, removing all doubt about if there will be regulation. It ...
This IDC Vendor Profile examines Claroty, a network security vendor competing in the emerging market for network security products that monitor industrial control system environments. It reviews key potential success factors for Claroty, th...
It seems that news stories about large-scale and high-profile cyberattacks are almost passé given that the reporting happens so frequently and the messages seem to be the same: "patch the machines." It's a great idea and absolutely necessar...
Ethics in artificial intelligence (AI) has been a hot topic for some time, and given the recent news surrounding Facebook, Cambridge Analytica, and the Trump campaign, the topic has heated up even more in recent weeks. Now, just two months ...
Privacy for the Slow and Bloated

Mar 2018 - IDC Link - Doc # lcUS43708318

by: Sean Pike

This may be premature, but can we talk about the adjudication and resolution of civil cases and regulatory proceedings in the United States for just a moment? It seems like the aggrieved "every man's" or "every woman's" first decision is de...
The EU General Data Protection Regulations (GDPR) may not require a significant investment in technology. Security and compliance professionals must take a pragmatic approach to the GDPR by examining and updating existing data governance po...
With the acquisition of Evident.io, Palo Alto Networks looks to target security in the DevOps process. As development teams are rolling out applications to the public cloud, three groups need to have visibility into those applications: DevO...
This IDC Perspective discusses IDC's take on the impact of Meltdown and Spectre on the enterprise server market.According to Laura DuBois, GVP for IDC Infrastructure Systems, "The scale of these latest vulnerabilities, the way it was report...
Cyber breaches happen all the time whether by accident or by the skilled hand of a sophisticated attacker. The recent Olympic Destroyer hack reminds us that motivation for various attacks may not always be about gain. The sole motivation fo...
This IDC study examines the market share of security and vulnerability management vendors in 2016 as well as the market forces that influenced their performances and the adoption of security and vulnerability management products."The effect...