Wellington Research delivers unseen cyber security insight. Our proprietary data and insight helps accelerate cyber security journeys in less time and with less risk.

Cyber Effectiveness and the CED KPI

Cyber effectiveness and the CED KPI – and its Cyber Event Days Key Performance Indicator – are inextricably linked with one another. Improving one improves the other – CED improvements result in better cyber effectiveness. In fact it is Cyber Event Days – the KPI – which reveals the diagnostic of what to do next

The Top 15 Cyber Spending Countries

Do you know which are the top 15 Cyber Spending Countries of the world? We did not know the answer to the question prior to completing our most recent research. But now we know. And we have to say we are a bit surprised at some of the answers. We are especially in awe of

Cyber’s ODI Operating Model – The Future of Cyber Security

Cyber’s ODI Operating Model is the emerging future of cyber security. This operating data intelligence (ODI) operating model will take over Cyber operations and be driven by data. However, as an actual set of realized practices today, Cyber’s ODI does not yet exist in full regalia and will not for some time. Despite being emergent,

Bitcoin and Blockchain – Bubble, Bubble Toil and Trouble

Can Bitcoin and Blockchain be compared with the misquoted line from Shakespeare’s play Macbeth, “Bubble, Bubble Toil and Trouble?” Unfortunately, Shakespeare never published his play Macbeth with the line “Bubble, Bubble Toil and Trouble” in it.  Instead, he published “Double, double toil and trouble, Fire burn, and cauldron bubble”, recited in unison by three witches

Cyber’s ESD Operating Model – Balancing Risk-Reward for the Digital Value Chain

Cyber’s ESD Operating Model (Eco Stack Defense) is a balancing act – with real world consequences – played out every day by organizations around the world. For enterprises with the least effective cyber security results, the ESD Eco Stack is an unknown, unseen and unused operating model. For those with the most effective results, Cyber’s

Cyber’s CDA Operating Model – Both Ends Against the Middle

For Cyber security, Cyber’s CDA Operating Model is, in practice, both ends operating against the middle. Both ends of CDA are focused on one thing, and one thing only: appropriate controls to manage the risk of using digital. In the case of CDA, one of its ends consists of all the activities focused on prevention,

Lots and Lots of Cyber Security Companies

There are lots and lots of cyber security companies. Did I say there are lots of them? There are lots and lots of cyber security companies We are compiling data on cyber security companies, and we recently passed more than 800 such companies. We are still counting. The more we dig into this segment of

Digital Transformation and Enterprise Inertia

The phrase of the day is digital transformation and its kissing cousin, which is disruption. What is less well understood – nor is it widely discussed – is the impact of organizational or enterprise inertia. Creative destruction, transformation and change The overwhelming talk-track heard in conference halls, in expo centers, on podcasts, in webinars, and

Cyber Security Operating Models and Cyber Effectiveness

Cyber Security Operating Models and Cyber Effectiveness. Operating Models for Cyber Security An operating model involves all the resources available to an organization to operate: it is used to express how companies deliver value to stakeholders and customers, it beneficiaries, and how organizations are structured to operate day-to-day. As such, operating models are an expression

2018 Cyber Security Spend Report

Wellington Research’s 2018 Cyber Security Spend Report is now available. Featuring global market spend for all things cyber, the report covers aggregate spending on cyber security from now through 2022. In addition, the report covers the allocation of spend on cyber across its many different procedures that are more or less automated by security products

Innovative Digital Business Models – Wellington Research Perspective

The era of innovative digital business models has arrived and with it as they say is something old, something new, something borrowed and something blue. Something old is the old businesses models of the tech industry now that every industry is a software company. Something new are actually new business models or ways to organize

Digital Business, Transformation and Automation

So what’s up with all the talk about digital business, transformation and automation? The way these are talked about you would think none of us have had anything to do with or been doing anything digital for the past fifty years. None of us who earned our stripes anyway – whether it bee with paper

Broad Spectrum Security Force Multipliers and Market Adoption

Broad spectrum force multipliers amplify the amount of work involved to produce more output. Examples of force multipliers in our daily lives are pulleys, levers, wheels, axles, gears, ramps, wedges, screws and hydraulics – such as brake lines on automobiles – that exert more force for the level of effort. Some of the more exotic

Brands are Dead – Customers are Loyal to UX

In the 21st century, customers are loyal to the User eXperience (UX for short). Yet all that marketers talk about is this “Brand” and that “Brand.” Is the concept of “brand” keeping marketers fully employed because they have hoodwinked everyone into believing “branding” has magical powers? I’m here to tell you the concept of “Brand”

Security’s Insecurity Problems

Security’s insecurity problems. Do you know what they are? The problems are related to what our five senses do and all these offer. They are related to physical sensors designed and used by people and all these deliver. It’s problems are related to neurons and synapses and all they convey. And security’s insecurity problems are

Will Enterprise IT Security Ever Converge?

Will the current state of enterprise IT security every converge? And if it does, should it? The funding, direction and delivery of enterprise IT security is currently split between different departments. And, what’s interesting to note is that this splitting of the IT security function is expressly established by design among most enterprises. The three

GDPR is all about PII data

GDPR is all about PII data. Observers not familiar with the practices of privacy and security often look perplexed when you tell them that – with the exception of data protected in transit for use with web applications and virtual private networking – most data stored and accessed via applications on-premises or via hybrid, private

Is SIEM Dead – or is SIEM being Transformed?

Is SIEM dead – or is SIEM being transformed? For those not familiar with it, SIEM is a combination of security event management (SEM) and security information management (SIM). It is two parts – SEM and SIM – that when joined together make for something else entirely. SEM.  The SEM part of SIEM is focused

No CMDB – Problem or Opportunity?

Do you have no CMDB and does this represent a problem or opportunity for you? For those not familiar with the term, CMDB stands for Configuration Management DataBase. Traditionally, such a database contains relevant information about the IT infrastructure, IT services, and the relationships between the two. Increasingly, CMDB  encompasses the relationships – and digital

Can You Say Security as a Service?

Security as a service is the future of security and it’s future is now. In the old days we used to code a lot. “What’s that”, you say? It was the day when we tweaked toggles on the front-end of the machine to bootload the system image, or loaded a paper tape to a memory

Featured Research

2018 Cyber Security Spend Report

The 2018 Cyber Security Spend Report focuses on global spend today through the coming five years. Did you know that global spend on cyber security is: More than $103 billion today Will exceed $130 billion by or before 2022 Today’s top two spend categories account for almost 50 percent of spend by enterprises today. The

Innovative Digital Business Models

Is your company making money using some of the innovative digital business models of the future, today? If not, it is important to understand what some of the new digital business models are, what they are best used for, who should consider using them, why they are important, and when they should be used. Not