Jack Poller
banner
poller.bsky.social
Jack Poller
@poller.bsky.social
290 followers 310 following 360 posts
Principle Cyber Security Industry Analyst, expert at leading Marketing, Engineering & Technology functions to deliver programs that translate strategy into actions to trigger growth for technology-led companies.
Posts Media Videos Starter Packs
Israel just recalled 700 Chinese cars from its military fleet because they're mobile intelligence platforms, not cars with connectivity.

The IDF couldn't to sterilize the surveillance systems.

The problem isn't just Chinese cars. It's every connected vehicle.

My analysis:
Why Israel Just Banned 700 Chinese Cars from Its Military—And What It Means for Security
In early November, the Israeli Defense Forces made a decision that sent ripples through defense and cybersecurity circles worldwide: withdraw every
securityboulevard.com
If 92% of cyberattacks touch DNS, why not make it your first line of defense? "It's always DNS" isn't just a troubleshooting meme anymore — it's a security opportunity.

My latest: turning DNS from problem into protection 🔒
securityboulevard.co... can make mistakes.

#XFD14
HPE wants to help customers gain intelligence about their entire body of unstructured data

#CFD24
HPE using GPU Direct and RDMA to accelerate S3-type object storage

#CFD24
Infrastructure isn't just software. It isn't just hardware. It's complete systems.

Here's part of HPE's solution

#CFD24

The marketing product name translator between HPE and Broadcom for virtualization

#CFD24

How are customers addressing their virtualization challenge?

HPE (via Gartner and ESG) says:

75% are evaluating options, 56% are investigating hypervisor alternatives

#CFD243
We're in the age of AI, but we're still talking about virtualization because that's the heart of the environment.

What's the virtualization challenge?

#CFD24
Day 0/Day 1/Day 2 are marketing terminology for the mishmash of continuous day-to-day work of the IT practitioner, and OpsRamp helps with the "Day 2" monitoring, maintenance, and remediation of your hybrid cloud environment.

#CFD24
Looking into the Morpheus self-service capabilities

#CFD24
HPE/Morpheus' prime purpose is to deliver the self-service capabilities for that which makes a cloud a cloud

#CFD24
HPE CloudOps Software: the value prop is to cover all the bases - Day 0 - Day N hybrid cloud operations

#CFD24
kicking off day 2 of Cloud Field Day with Brad Parks and Hewlett Packard Enterprise discussing enabling a hybrid cloud operating model with HPE

Join us live at
HPE Presents at Cloud Field Day 24 | Tech Field Day
HPE Presents at Cloud Field Day 24
www.linkedin.com
Oxide Computers: Co-Founder Steve Tuck says it's not hardware, it's not software, it's a co-designed hardware and software system.

With the emphasis on system.

#CFD24
Interesting Tidbit - Among other SLAs, Pure Storage has a Ransomware SLA: will ship a replacement array and an FTE so that you can take your infected array offline for forensic investigation.

#CFD24
The blockchain was supposed to revolutionize trust. Instead, attackers turned it into unkillable malware infrastructure.

EtherHiding stores malicious code on Ethereum/BNB Smart Chain—making it impossible to take down.
The Unkillable Threat: How Attackers Turned Blockchain Into Bulletproof Malware Infrastructure
The blockchain was supposed to revolutionize trust. Instead, it's revolutionizing cybercrime. Every foundational principle that makes blockchain
securityboulevard.com
The endpoint moved to the browser. Your security tools didn't.

Legacy SWGs & EDR can't see inside the browser—attackers are exploiting this blind spot with evasive assembly attacks.

Time to adopt Browser Detection & Response 🔒

Read more: securityboulevard.co...

#XFD14 @getsquarex
The Endpoint Has Moved to the Browser — Your Security Tools Haven't
Your users aren't downloading files to their desktops anymore. They're not running local applications. They're working in Google Docs, Salesforce, Slack,
securityboulevard.com
Microsoft wants to coin the term "vibe hunting" for threat hunting using Security Copilot AI agents and capabilities.

Is that good or bad?

#TFDx #TFDxMSSec25 #Microsoft #Security
Security Copilot example: The graph database exposes the (potential) blast radius of an event

#TFDx #TFDxMSSec25 #Microsoft #Security