There are a lot of experts and process gurus who are more qualified than I to
tell you how to manage change. They will offer a great deal of high level
advice such as “define the vision,” “create a change proposition,”
“promote staff input to shape the solution.” And these are very wise
nuggets of advice. And we (in IT) are at a crossroads for change. The
landscape of the role, the challenges of the responsibilities, the tools of
the trade are all evolving.
Much of the change revolves around the migration to cloud-based solutions.
For going on a dozen years, SaaS applications have ingrained themselves in
most IT architectures-from ERP/CRM to payroll to security-as-a-service.
Without extolling the virtues of the cloud solutions themselves, what this
has done is transformed and upgraded the value of the IT professional.
Whereas there is a sincere appreciation for t... (more)
In business, data is currency. It is the oil that keeps the commercial engine
in motion and databases are the digital banks that store and retrieve this
valuable information. And, according to IDC, data is doubling every two
years. But as the overall amount of data grows, so does the amount of
sensitive and regulated data. All this data stored by enterprises requires
high levels of security. Presently (again, according to IDC) only about a
quarter of that data is being properly protected now. Like all currency, data
must be protected.
And herein lays a key issue. Too many execut... (more)
With all the talk of fiscal cliffs sequestrations, financial binds and
“next year’s budget,” I started thinking about cloud security in more
tangible ways. Specifically returns on investment, economic impact and total
costs of ownership. Just like death and taxes, businesses can add intrusion
and attack to the list of sureties. I can hear CFOs all over the world sigh
in exasperation as they feel pressured to add another expense line item to
minimize the building security threats to their enterprises.
Before you add another decimal place to security budgets, maybe it’s time
you c... (more)
Of course not. But that’s the dollar figure companies stand to lose in
terms of consumer trust when security protocols are breached according to a
recent study by the research firm Ponemon.
In terms of dollars and cents on a risk analysis spreadsheet, it is easier to
put a value on a particular asset than the potential recurring value of a
client, customer or even partner. Beyond lawsuits and capital and operational
expenses to repair a mea culpa, weak cryptography, hack defenses or shoring
an previously-undiagnosed vulnerability gap, the damage done to a brand
because the user ... (more)
Conspiracy theorists and other concerned citizens will insist the government
is watching every keystroke, keeping a record of every website, transaction,
text and email. Shades of 1984’s Big Brother, right? These last few weeks,
the news has been brimming with revelations of data surveillance and
monitoring by the government (not to mention data harvesting corporations
like Google, Yahoo, Facebook etc…). Everyone, including the security buffs
at CloudAccess, is sensitive as to what is being looked at, stored, and
analyzed for hazily defined purposes. Privacy is no longer as priva... (more)