Today's is a cautionary tale. One that you've probably heard before, but I
promise a new spin on making sure it won't happen again.
It's a true story. It recently happened to a colleague's friend's business.
But it is not an isolated incident. Because the information is sensitive and
the wounds still raw, I have changed the names to protect the innocent and
It was a dark and stormy night...
Dan is the CEO and CTO of a privately owned business that develops software
tools to manage lease lifecycles and other financial information. His primary
customer is commercial real estate agencies across the country. For the past
12 years, it has been highly successful despite some of the economic
battering the housing market took over the past several years. The company
clears somewhere in the neighborhood of 30-50 million per year. He employs
about 150 p... (more)
The biggest eye-opener in Gartner's recently-published study on the current
agenda regarding the digital landscape for Chief Information Officers is that
CIO’s recognize that cloud computing will not only be a significant part of
the future, but that their own roles and behavior need to be updated to
survive in the modern enterprise.
“CIOs will have to develop new IT strategies and plans that go beyond the
usual day-to-day maintenance of an enterprise IT infrastructure….
technologies provide a platform to achieve results, but only if CIOs adopt
new roles and behaviors to find di... (more)
What is it they say…you get what you pay for, right? In most cases, that is
a spot on assessment but in terms of the cloud-based security, the numbers
tend to add up towards the benefit of the user. But let’s get the whole
idea of numbers down straight. It’s all relative. What is pricy for one
organization is downright affordable to another, so in terms of costs let’s
look squarely at the moving target of return on investment. What makes cloud
security compelling is how the costs break down in terms of hard and soft
First let’s compare apples to apples. I am not ta... (more)
Last month the Federal Financial Institutions Examination Council (FFIEC)
shared an opinion on the viability and security of cloud computing. In the
four-page statement, the interagency body empowered to prescribe uniform
principles, standards, stated that cloud computing is “another form of
outsourcing with the same basic risk characteristics and risk management
requirements as traditional forms of outsourcing.”
What they are offering is a back-handed endorsement of cloud computing with
the caveat that if you perform your due diligence and the solution passes the
security smell... (more)
There’s data. And then there’s BIG DATA. Many of us have been bombarded
with the term in many frameworks. There are some professionals that chalk it
up to marketing hype or meaningless buzzword. Personally, I prefer the way
Gartner categorizes it. That it is more than size. It is a multi-dimensional
model that includes complexity, variety, velocity and, yes, volume.
But the pressing issue with this definition of Big Data is how best to secure
something so vast and multifaceted. If you recognize the old concept of a
network perimeter is antiquated and dangerously narrow, there shou... (more)