Welcome!

The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Nikkhoo

There are a lot of experts and process gurus who are more qualified than I to tell you how to manage change.  They will offer a great deal of high level advice such as “define the vision,” “create a change proposition,” “promote staff input to shape the solution.” And these are very wise nuggets of advice. And we (in IT) are at a crossroads for change. The landscape of the role, the challenges of the responsibilities, the tools of the trade are all evolving. Much of the change revolves around the migration to cloud-based solutions. For going on a dozen years, SaaS applications have ingrained themselves in most IT architectures-from ERP/CRM to payroll to security-as-a-service. Without extolling the virtues of the cloud solutions themselves, what this has done is transformed and upgraded the value of the IT professional. Whereas there is a sincere appreciation for t... (more)

Don't Stick Your Head in the Sand, Create a Proactive Security Strategy

In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC, data is doubling every two years. But as the overall amount of data grows, so does the amount of sensitive and regulated data. All this data stored by enterprises requires high levels of security. Presently (again, according to IDC) only about a quarter of that data is being properly protected now. Like all currency, data must be protected. And herein lays a key issue. Too many execut... (more)

It’s Money That Matters in the Cloud… Well, At Least ROI

With all the talk of fiscal cliffs sequestrations, financial binds and “next year’s budget,” I started thinking about cloud security in more tangible ways. Specifically returns on investment, economic impact and total costs of ownership. Just like death and taxes, businesses can add intrusion and attack to the list of sureties. I can hear CFOs all over the world sigh in exasperation as they feel pressured to add another expense line item to minimize the building security threats to their enterprises. Before you add another decimal place to security budgets, maybe it’s time you c... (more)

Can Your Company Afford to Lose $400 Million?

Of course not. But that’s the dollar figure companies stand to lose in terms of consumer trust when security protocols are breached according to a recent study by the research firm Ponemon. In terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a particular asset than the potential recurring value of a client, customer or even partner. Beyond lawsuits and capital and operational expenses to repair a mea culpa, weak cryptography, hack defenses or shoring an previously-undiagnosed vulnerability gap, the damage done to a brand because the user ... (more)

Is IDaaS a Trustworthy and Feasible Option?

Conspiracy theorists and other concerned citizens will insist the government is watching every keystroke, keeping a record of every website, transaction, text and email. Shades of 1984’s Big Brother, right? These last few weeks, the news has been brimming with revelations of data surveillance and monitoring by the government (not to mention data harvesting corporations like Google, Yahoo, Facebook etc…). Everyone, including the security buffs at CloudAccess, is sensitive as to what is being looked at, stored, and analyzed for hazily defined purposes. Privacy is no longer as priva... (more)