Time to Take Enterprise Processes on the Go
According to the Consumerization of IT research Unisys has conducted with IDC, organizations are still unprepared for the rapidly growing usage of consumer technologies in the workplace. Worried about...
View ArticleDeconstructing CyberCrime: Beyond Sensational News Stories
Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.
View ArticleThe Six Biggest Hacking Threats and How to Deal with Them
There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...
View ArticleConsumerization and Government: The Power of Policy
The consumerization of IT in government is a promising concept, but making it a reality is easier said than done. The federal government needs a standardized approach to adopting consumer technologies...
View ArticleTheft by Hacking: Three of the Top Six Threats (Part I)
In my last post, I explained why no organization is safe from hackers. Hackers are successful because most IT organizations still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—to...
View ArticlePreventing Data Leaks Before They Occur, Part I
Well, absolutely preventing data leaks is only possible if the data never goes anywhere. But since data is vulnerable from the time it is created, information managers need to deal with the...
View ArticlePreventing Data Leaks Before They Occur, Part II
So how do we get employees to think about the issues clearly? By implementing consistently enforced policies and user education/outreach. The following sequence defines the “best practice” steps for...
View ArticlePreventing Data Leaks Before They Occur, Part III
As I said in my last blog post — Preventing Data Leaks Before They Occur, Part II – there are several access controls to consider that protects data: Proactive scanning of all endpoints to ensure that...
View ArticlePreparing for Your Private Cloud, Part III: Decide How You Will Provision and...
Standard management practices shouldn’t go away when you adopt a private cloud. You should have a way to measure, monitor, and improve its effectiveness. Security policies must be maintained – in fact...
View ArticleBeyond the Hype of Consumerization of IT, Part I: The Data
Yes, consumer technology is raging a war against the enterprise, creating a demand for CIO’s to grant access to precious network resources from devices the employee owns. However, many are quick to...
View ArticleBeyond the Hype of Consumerization of IT, Part II: The Device and Its Role
Now that you’ve looked at the IT architecture, you need to examine which devices should be enabled to get the data, and how you’re going to deal with them. There are several approaches to achieve...
View ArticleBeyond the Hype of Consumerization of IT, Part III: We Are Ready To Deploy!
Review IT Architecture. Check. Determine Who’s Getting Access To What Device. Check. Reviewed Governance And Lay Out Strategy. Check. Now what? Bridge the IT and Employee Gap By now you’ve found out...
View ArticleWhat Good Are Social Media Security Policies If Nobody Knows About Them?
There’s been lots of talk about the need for organisations to develop policies and employee guidelines for appropriate use of social media in the workplace. These policies would address who is...
View ArticleInternational Cooperation Required To Tackle Global Cybercrime
One of the best things about the Internet is the way it removes geographic barriers and provides access to a global market place and information resource. However these same qualities also enable the...
View ArticleEfficiently Securing User Communities with IT Appliances
There are many business challenges that drive the need to secure network access by teleworkers and travelling laptop users: CIOs worry about security breaches eroding customer trust, with subsequent...
View ArticleUnderstanding the Hacker
Many of you, like me, will be aware of the online conference organisation TED (Technology, Education and Design). The conferences are first class, easily digestible and recently featured a journalist –...
View ArticleMichigan Cyber Summit – Unisys Takes Part in National Cyber Security...
I just came back from the Michigan Cyber Summit that was hosted by Governor Rick Snyder and Michigan CIO David Behen. This event was the launch site for the National Cyber Security Awareness Month with...
View ArticleConsumerization of IT: Moving Beyond Security Concerns for IT Organizations,...
Ok, there are too many articles about how IT organizations are stymied by the proliferation of mobile devices within their environment and their need to secure enterprise data. This is known as the...
View ArticleConsumerization of IT: Moving Beyond Security Concerns for IT Organizations,...
Understanding application modernization scenarios – if your enterprise has been around for more than a few years, inevitably you find that some of the applications reside on older mainframes or servers...
View ArticleConsumerization of IT: Moving Beyond Security Concerns for IT Organizations,...
Understand the security requirements – security considerations are part of every aspect of secure mobility. From the devices you decide to support, the applications and access you provide, the...
View Article
More Pages to Explore .....