Welcome!

The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Nikkhoo

You realize the overarching benefits of the cloud, but you are a bit wary regarding the security of any data stored and transacted in these virtualized environments.  But the cost-saving benefits and user preference and resource delegation of the cloud are such that not integrating some processes, applications and data is counterproductive to your overall IT strategy. So you decide that a private cloud is a more secure route that its public counterpart. But are you really any more secure? The quick answer is no. But not for the reason you might think. A private cloud is infrastructure operated solely for a single organization. The only difference is that your data is segregated from any other organization. And if that brings you any semblance of peace, then it’s a good investment. It all depends on your business need. It offers greater control, but means you should... (more)

CloudAccess Unveils Integrated Version of Identity and Access Management

CloudAccess, a provider of unified security solutions from the cloud, announced the release of the latest version of CloudIDM/AM which features a unique and seamless integration between enterprise identity management and access control (single sign on/access management) from the cloud. “We’ve taken the next evolutionary step to integrate the key capabilities of provisioning, multi-factor authentication and role-based workflow management with an advanced single sign on for SaaS and legacy applications and manage it all from the cloud,” said CloudAccess CEO Kevin Nikkhoo. According... (more)

PCI Compliance for Retailers from the Cloud Perspective

One of the key drivers to IT security investment is compliance. Several industries are bound by various mandates that require certain transparencies and security features. They are designed to mitigate aspects of risk including maintaining the sacrosanctity of customer information, financial data and other proprietary information. One such affected vertical is retail. No matter if you’re Wal-Mart or Nana’s Knitted Kittens, if you store customer information; if you process payments using customer’s credit cards, you are required by law to comply with a variety of security standar... (more)

A Job for Man or Machine

A Chief Technology Officer for a Midwest banking holding company made a very interesting observation. In commenting about the needed increase in fraud fighting resources, he warned about the perils of overemphasizing technology while ignoring training staff in using manual fraud-detection processes. Most of what he says is spot on in terms of ensuring the proper prioritization, risk analysis and the blind reliance on technology to identify and neutralize threats and breaches. In fact, as an officer in a technology company, I happen to agree with him on almost everything he said. ... (more)

Rethinking IT: Using the Cloud as Change Catalyst

There are a lot of experts and process gurus who are more qualified than I to tell you how to manage change.  They will offer a great deal of high level advice such as “define the vision,” “create a change proposition,” “promote staff input to shape the solution.” And these are very wise nuggets of advice. And we (in IT) are at a crossroads for change. The landscape of the role, the challenges of the responsibilities, the tools of the trade are all evolving. Much of the change revolves around the migration to cloud-based solutions. For going on a dozen years, SaaS applications ... (more)