Security, Technology, Operations Franklin Donahoe Security, Technology, Operations Franklin Donahoe

The MITRE CVE System

This article provides a comprehensive overview of the Common Vulnerabilities and Exposures (CVE) system, the global standard for identifying and naming cybersecurity vulnerabilities. It covers the history, purpose, and operational structure of CVE, including the roles of MITRE Corporation, CNAs, and the CVE Board. The article also discusses the importance of CVE in the cybersecurity ecosystem, its integration with other standards like NVD and CVSS, and the potential impact of its discontinuation. Additionally, it examines alternative vulnerability identification systems and highlights the ongoing challenges and future directions of the CVE program, including recent funding concerns.

Read More
Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

Embracing an Operation-Centric Security Model for Modern Threat Defense

This article discusses the shift from traditional, reactive cybersecurity models focused on Indicators of Compromise (IOCs) to a more proactive, operation-centric approach that emphasizes Indicators of Behavior (IOBs). It explores the limitations of traditional models, the advantages of the operation-centric model, the necessary technology stack, implementation considerations, and the key roles and skills required for successful operation. The article advocates for understanding the "attack narrative" and utilizing frameworks like MITRE ATT&CK to proactively defend against modern cyber threats.

Read More
Strategy, Technology, Operations, Leadership Franklin Donahoe Strategy, Technology, Operations, Leadership Franklin Donahoe

The Intertwined Roles of IT Service Management and IT Operations Management in Achieving CIO Objectives

This article discusses the critical interplay between IT Service Management (ITSM) and IT Operations Management (ITOM) in modern IT. It defines each discipline, explores their relationship, and analyzes their strategic importance for CIOs and overall business success. The article also examines technology platforms used for ITSM and ITOM, challenges in implementation, roles and responsibilities, benefits, and current trends shaping their future.

Read More
Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

Modernizing Network Infrastructure for the Age of Artificial Intelligence

This article discusses the critical need for modernizing network infrastructure to support the demands of Artificial Intelligence (AI) workloads. It highlights how legacy networks are inadequate for AI, outlines the key requirements of AI-ready networks, explores enabling technologies like SDN and 5G, and addresses the challenges and benefits of network modernization for AI.

Read More