Welcome!

The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Kevin Nikkhoo
A recent Gartner study states that the function of the modern CIO is in flux and that his or her future focus must incorporate digital assets (aka cloud-based data and applications) to remain relevant. Towards the goal of riding the sea change a compiler of stacks to a broker of busine...
With the endorsement by the Federal Financial Institutions Examination Council (FFIEC), smaller financial institutions which a beholden to many compliance audits and security issues can now explore the possibility of outsourcing security features from the cloud. Now these organizations...
The costs of holistic security are very different from company to company when considering direct costs, soft costs, hidden requirements, scope of services, and migration issues. What is it they say…you get what you pay for, right? In most cases, that is a spot on assessment but in te...
It happens every day. Someone in sales or research or HR or some other department finds an application they think might help with their goals--and they download it without any approval from IT. Seems harmless enough, but the creation of this Shadow IT actually creates more problems and...
As the technology evolves, so do the roles of the IT Department. There is a sea change whereby an effective organization doesn't need those to plug in cables and write endless code as much as to recognize and broker IT needs for the betterment of the enterprise. There are a lot of exp...
The password leakage from business social media site LinkedIn showed us that passwords are indeed the weakest link in terms of security. As this site (and those like it) are a growing part of business and marketing strategies, it is time IT professional find ways to circle the wagon an...
It’s obvious the rise of SaaS (software-as-a-service) has changed the game. The benefits of subscribing to a cloud-based application service are already well-known and documented: cost-efficiencies, speed, hands-off maintenance, etc… It’s no longer an emerging practice and, for most IT...
Using cloud based security to separate log data from actionable events. The ability to employ situational awareness across all the silos of an enterprise creates the necessary context to break through the white noise of network traffic. I recently came across an article regarding the ...
Many see the terms risk and threat as interchangeable. However in the simplest of terms, risk the probability or frequency of doing harm while threat is the actual or attempted infliction of that harm. Tomato, tomahto? It’s all about keeping your IT assets protected, right? I was chat...
Many organizations are now allowing employees to use their personally-owned devices for work purposes with the goal of achieving improved employee satisfaction and productivity. However, this comes at an IT price and can pose several challenges with ensuring security. We live and work...
When developing your security architecture, look to the 500 year old medieval castle model to create layers of protection. And this best practice extends itself to the cloud as security-as-a-service. One of the true benefits of the cloud is the ability to reconfigure and create a stro...