One of the true benefits of the cloud is the ability to reconfigure and
create a stronger, more active asset protection strategy than you might be
able to otherwise afford. But let’s look beyond the cost factor for a
moment and analyze a true best practice that gives an organization a true
advantage within the cloud and an overall strategic deployment of security
To look at the future of security configuration we have to look back 500
years into the mists of history to see a model that worked well then…and
works just as well today. I’m talking specifically of the castle. In terms
of a current strategic deployment let’s call it the layered prevention
model. In its day the castle was a state of the art defense strategy. In the
center you have the king (and the king’s most precious possessions).
Surrounding the king are his elite and trusted guards armed an... (more)
There are a lot of experts and process gurus who are more qualified than I to
tell you how to manage change. They will offer a great deal of high level
advice such as “define the vision,” “create a change proposition,”
“promote staff input to shape the solution.” And these are very wise
nuggets of advice. And we (in IT) are at a crossroads for change. The
landscape of the role, the challenges of the responsibilities, the tools of
the trade are all evolving.
Much of the change revolves around the migration to cloud-based solutions.
For going on a dozen years, SaaS applications ... (more)
You realize the overarching benefits of the cloud, but you are a bit wary
regarding the security of any data stored and transacted in these virtualized
environments. But the cost-saving benefits and user preference and resource
delegation of the cloud are such that not integrating some processes,
applications and data is counterproductive to your overall IT strategy. So
you decide that a private cloud is a more secure route that its public
counterpart. But are you really any more secure?
The quick answer is no. But not for the reason you might think. A private
cloud is infrastr... (more)
Of all the strategies and tactics available to prevent breaches, deter data
leakage and theft, control access and secure beyond the so-called network
perimeter, the one that is emerging as an achievable and affordable best
practice is that of unified security from the cloud.
But if you look across the web, you will no doubt come across various
versions of what constitutes “unified,” what is “protected,” and,
what is “security from the cloud?” Luckily this means that the concept of
unified security from the cloud is becoming more and more of a best practice.
In general, the pract... (more)
“Don’t care how…I want it now!”
-Veruca Salt (Willy Wonka and the Chocolate Factory)
We live and work in a world of immediate gratification. In the name of
greater productivity if you need to check inventory from a supplier’s
warehouse…click there it is. Share a file on Dropbox, no problem. Add
detail about a meeting in the sales database… click! Update your Facebook
or LinkedIn status. Email a white paper to a potential client...click, click.
Want to see that flying pig meme…well, you get the picture.
Now that’s not necessarily a bad thing…unless you’re an IT professional
and th... (more)