It’s obvious the rise of SaaS (software-as-a-service) has changed the game.
The benefits of subscribing to a cloud-based application service are already
well-known and documented: cost-efficiencies, speed, hands-off maintenance,
etc… It’s no longer an emerging practice and, for most IT managers, has
become an inextricable component of any go-forward IT network strategy. What
this means is now there are dozens of new sign-ons per user from a variety of
endpoints (including mobile and tablet). And if we are talking
enterprise-wide deployments, this is can be as challenging as herding cats.
And since it is highly likely, a SaaS portfolio will continue to grow, so
will the challenges and the need to centralize authorization and control of
all these new applications. Many organizations have considered single-sign
on, but during recent needs for economic belt-tightening, s... (more)
A few weeks back I was watching my beloved San Diego Chargers lose in a most
embarrassing way on Monday night. And in the waning seconds of blaming the
quarterback for such ineffectual 2nd half play, it occurred to me, it
wasn’t his fault. It was the coach. It was the lack of planning for the
type of attack the Denver Broncos would bring. It was the lack of leadership
that should have easily closed the deal. In short, it was sticking to the
status quo while everything around was changing.
My second epiphany was that this is a spot-on metaphor for the recent spate
of bank hacks ... (more)
There was a time the only security issues retailers needed to be concerned
with was theft. Put a guard in the store and a couple of video cameras and
prevent as much loss as possible. Those days are long gone.
The overall security of a retail organization has grown increasingly complex.
The smash and grab has been supplanted by the hack and breach. A
retailer’s IT environment is at as much risk as the product on the retail
shelf. Every year hundreds of retailers fall victim to electronic intrusion.
Ask Raley’s, Zaxby’s, Mapco, Michaels’s and dozens of retailers about
how their... (more)
“Don’t care how…I want it now!”
-Veruca Salt (Willy Wonka and the Chocolate Factory)
We live and work in a world of immediate gratification. In the name of
greater productivity if you need to check inventory from a supplier’s
warehouse…click there it is. Share a file on Dropbox, no problem. Add
detail about a meeting in the sales database… click! Update your Facebook
or LinkedIn status. Email a white paper to a potential client...click, click.
Want to see that flying pig meme…well, you get the picture.
Now that’s not necessarily a bad thing…unless you’re an IT professional
and th... (more)
Last month the Federal Financial Institutions Examination Council (FFIEC)
shared an opinion on the viability and security of cloud computing. In the
four-page statement, the interagency body empowered to prescribe uniform
principles, standards, stated that cloud computing is “another form of
outsourcing with the same basic risk characteristics and risk management
requirements as traditional forms of outsourcing.”
What they are offering is a back-handed endorsement of cloud computing with
the caveat that if you perform your due diligence and the solution passes the
security smell... (more)