Tal Klein

Tal Klein

Detroit Metropolitan Area
4K followers 500+ connections

Articles by Tal

  • To the left. Shift IT to the left.

    To the left. Shift IT to the left.

    From the moment personal computing was adopted by business, we've wrestled with the challenges and costs of supporting…

  • The Microsoft acquisition of LinkedIn makes perfect sense

    The Microsoft acquisition of LinkedIn makes perfect sense

    I find it interesting that since it was announced earlier this week, the majority of discussion about Microsoft’s…

    15 Comments
  • On Science Fiction and Product Strategy

    On Science Fiction and Product Strategy

    TLDR: I wrote a science fiction book utilizing Wardley Mapping to predict the future of tech and the Earth, then placed…

    7 Comments
  • Pop Quiz: Security vs Productivity

    Pop Quiz: Security vs Productivity

    What's worse for business: A non-productive user or a compromised user? Whether you come from an infosec or IT…

    6 Comments
  • The kind of people I've always got time for

    The kind of people I've always got time for

    Some of you may know that I’ve been running a small independent label as a hobby on the side since my college days. I…

    6 Comments
  • Four Thoughts on IT, SaaS, and Windows 10

    Four Thoughts on IT, SaaS, and Windows 10

    Early last week Office 365 experienced a massive outage. IT departments dealing with these issues could only tell users…

Contributions

Activity

Join now to see all activity

Experience

  • Broadcom Graphic

    Broadcom

    Palo Alto, California, United States

  • -

    Oakland, California, United States

  • -

    Royal Oak, Michigan, United States

  • -

    Palo Alto, California, United States

  • -

    Birmingham, Michigan, United States

  • -

    Birmingham, Michigan, United States

  • -

    Birmingham, Michigan

  • -

    Bloomfield Hills, MI

  • -

    Bloomfield Hills, MI

  • -

    Palo Alto, California

  • -

    Cupertino, CA

  • -

    Santa Clara, CA

  • -

  • -

  • -

  • -

  • -

  • -

    Greater New York City Area

  • -

    Greater New York City Area

Publications

  • The New Normal: Assume Malicious Back Doors Are Part of Your Infrastructure, Carry on

    The New Stack

    Breaches are reminders that nobody is immune to risk or being compromised. And that’s okay.

    See publication
  • Why Vulnerability Management Needs a Patch

    The New Stack

    A CARTA approach to prioritizing vulnerabilities correctly shifts focus on the vulnerabilities which represent an actual threat. Patching or compensating for those vulnerabilities is the upper echelon of vulnerability management. Once this class of vulnerabilities is treated, there is a greater window to implement better hygiene in the CI/CD pipeline by eliminating vulnerable components that serve no operational purpose, as well as remediate and mitigate vulnerabilities with a lower probability…

    A CARTA approach to prioritizing vulnerabilities correctly shifts focus on the vulnerabilities which represent an actual threat. Patching or compensating for those vulnerabilities is the upper echelon of vulnerability management. Once this class of vulnerabilities is treated, there is a greater window to implement better hygiene in the CI/CD pipeline by eliminating vulnerable components that serve no operational purpose, as well as remediate and mitigate vulnerabilities with a lower probability of being exploited. Gradual risk reduction can then be executed based on standard vulnerability management processes and policies.

    See publication
  • Putting an end to IT monitoring sprawl

    Computerworld

    Despite the trend to add new capabilities to these monitoring tools from the other domains via systems-of-record, large IT organizations often struggle to deliver the unified analysis—the “source of truth”—needed to ensure digital business success. As a result, IT leaders find it difficult to combine the “hints” (or “puzzle pieces”) that each domain-specific monitoring tool uncovers into a cohesive understanding of the behavior of the overall service, the root causes of problems and the niche…

    Despite the trend to add new capabilities to these monitoring tools from the other domains via systems-of-record, large IT organizations often struggle to deliver the unified analysis—the “source of truth”—needed to ensure digital business success. As a result, IT leaders find it difficult to combine the “hints” (or “puzzle pieces”) that each domain-specific monitoring tool uncovers into a cohesive understanding of the behavior of the overall service, the root causes of problems and the niche views that groups require across the entire IT landscape.

    See publication
  • Is it time to fire your SLAs?

    Computerworld

    “What to measure” and “How to measure” are well-known dilemmas for IT executives. The reality is that many IT projects are measured by criteria that are more closely aligned with completion rather than success—meaning IT is telling the business, “measure us by our adherence to the project plan rather than the benefits that the project provides to the organization.”

    See publication
  • Four Thoughts on IT, SaaS, and Windows 10

    Pulse

    End-user analytics is the big support gap in end user computing – how can IT support (and ideally risk manage) end-users that are interacting with privileged data on unmanaged devices using unsanctioned applications? They have to make a compact with the users that benefits the users by providing them with support regardless of device, operating system, applications, and behavior.

    See publication
  • Has Security Ops Outlived Its Purpose?

    Dark Reading

    CISOs will need more than higher headcounts and better automation tools to solve today's security problems.

    See publication
  • The Case for Naked Risk Management

    International Association of Privacy Professionals

  • Mind the Cloud Security Gap

    WIRED

    A piece about the root of existing "defense in depth" limits in protecting SaaS usage.

    See publication
  • Try Thinking Like a User

    SC Magazine

    Most security solutions are monolithic. They exist to simplify policy enforcement, not to enable users. It seems obtuse to assume there could be a static rule system for all possible user activities, yet this is the status quo. The one-size-fits-all approach does not take into account user security needs that are as varied as the people who rely upon them.

    See publication

Languages

  • English

    Native or bilingual proficiency

  • Hebrew

    Native or bilingual proficiency

Recommendations received

More activity by Tal

View Tal’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tal directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Tal Klein

Add new skills with these courses