Jon Oltsik, CSOonline

Jon Oltsik

CSOonline

Chicago, IL, United States

Contact Jon

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • CSOonline
  • Network World

Past articles by Jon:

XDR: Still confusing after all these years

It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy. → Read More

Making the case for security operation automation

Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects. → Read More

Operationalizing a “think like the enemy” strategy

MITRE ATT&CK and new security technology innovation make this possible. → Read More

Security hygiene and posture management: A 2022 priority

Disjointed tools and manual processes provide an incomplete and unacceptable picture of cyber-risk. → Read More

Will XDR modernize the SOC?

Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives. → Read More

5 things CISOs want to hear about zero trust at the RSA Conference

Security executives are interested in how ZT vendors will integrate with existing technologies, supplement ongoing projects, and support business processes. → Read More

4 steps to better security hygiene and posture management

Increasing scale and complexity have made keeping up with security hygiene and posture management cumbersome and error prone, leaving organizations exposed. Here's what leading CISOs are doing to close the gap. → Read More

XDR is coming: 5 steps CISOs should take today

Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021. → Read More

5 persistent challenges security pros face

Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report → Read More

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program. → Read More

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020. → Read More

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits. → Read More

Is the cybersecurity skills shortage getting worse?

New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread. → Read More

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model. → Read More

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements. → Read More

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements. → Read More

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success. → Read More

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform. → Read More

The Transition Toward Enterprise-class cybersecurity Vendors

Information security professionals working at enterprise organizations want to work with vendors who have experience with business/IT initiatives and industry knowledge → Read More

What I learned at Tufin's customer conference (Tufinnovate)

Massive network security changes, cloud adoption, and a pressing need for network security process automation were among the things discussed at Tufin's customer conference. → Read More