Welcome!

The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Nikkhoo

It’s obvious the rise of SaaS (software-as-a-service) has changed the game. The benefits of subscribing to a cloud-based application service are already well-known and documented: cost-efficiencies, speed, hands-off maintenance, etc… It’s no longer an emerging practice and, for most IT managers, has become an inextricable component of any go-forward IT network strategy. What this means is now there are dozens of new sign-ons per user from a variety of endpoints (including mobile and tablet). And if we are talking enterprise-wide deployments, this is can be as challenging as herding cats. And since it is highly likely, a SaaS portfolio will continue to grow, so will the challenges and the need to centralize authorization and control of all these new applications. Many organizations have considered single-sign on, but during recent needs for economic belt-tightening, s... (more)

Lessons Learned from LinkedIn

Users are making it too easy for hackers. If we take a closer look at the 6.5 million hashed LinkedIn passwords that leaked we find a large swath of the user population are ignoring warnings of overly simplistic and obvious passwords. Would you believe the most common word or phrase found in a 160K sampling of the list was “link”? And would you further shake your head in disbelief that “1234” and “12345” followed close behind. Rounding out the top 10 were “work,” “god,” “job,” “angel,” “the,” “ilove,” and “sex.” More so than Facebook, LinkedIn is the social media of choice for bu... (more)

Casting Light on Shadow IT and ID

It's not a new term or concept. You probably recognize that it’s happening within your own organization. Shadow IT is the appropriation and use of IT assets and applications without organizational approval.  And it happens more than you know. Sally the sales rep gets a label template design application, Marco from HR downloads software that manages inbound resumes. Kelsey in marketing signs up for a WordPress page and social media accounts. All too often, employees are not going through corporate channels to get what they need to achieve their goals. And every time they do, the ... (more)

It’s a Wonderful Cloud-a Security Carol

Happy holidays to all of you and may the season keep your perimeters protected, your assets secure and your networks free of nasty little elves! Twas the night before Christmas and all through the net No access was stirring; No hackers as yet. Murphy in sales was showing his app Tweeting and downloading with only a tap I grumble and moan ‘cause I know it to be. That his iPhone and iPad was BYOD Then out on the site there arose such a clatter, I sprang from the help desk to see what was the matter. Without my UniSec dashboard, I would not know If the network alert meant friend or meant fo... (more)

Revealing Cloud-Driven Best Practices

Effectively managing individual online user identities while controlling their specific application and data access privileges continue to be a challenge for IT administrators. CloudAccess, a leader in cloud-based security solutions is hosting a complimentary webinar that address best practices to overcome the issues of complexity, expense and available resources. The 45-minute presentation, titled "One Click...From Directory to Cloud," and scheduled for May 22nd and 28 at 11:00am PDT, boldly asks the question, "What if you could add a user from any directory or database and it s... (more)