Quantcast
Channel: Disruptive IT Trends » Security
Browsing all 63 articles
Browse latest View live

Time to Take Enterprise Processes on the Go

According to the Consumerization of IT research Unisys has conducted with IDC, organizations are still unprepared for the rapidly growing usage of consumer technologies in the workplace. Worried about...

View Article



Deconstructing CyberCrime: Beyond Sensational News Stories

Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.

View Article

The Six Biggest Hacking Threats and How to Deal with Them

There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...

View Article

Consumerization and Government: The Power of Policy

The consumerization of IT in government is a promising concept, but making it a reality is easier said than done. The federal government needs a standardized approach to adopting consumer technologies...

View Article

Theft by Hacking: Three of the Top Six Threats (Part I)

In my last post, I explained why no organization is safe from hackers. Hackers are successful because most IT organizations still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—to...

View Article


Preventing Data Leaks Before They Occur, Part I

Well, absolutely preventing data leaks is only possible if the data never goes anywhere.  But since data is vulnerable from the time it is created, information managers need to deal with the...

View Article

Preventing Data Leaks Before They Occur, Part II

So how do we get employees to think about the issues clearly?  By implementing consistently enforced policies and user education/outreach.  The following sequence defines the “best practice” steps for...

View Article

Preventing Data Leaks Before They Occur, Part III

As I said in my last blog post — Preventing Data Leaks Before They Occur, Part II – there are several access controls to consider that protects data: Proactive scanning of all endpoints to ensure that...

View Article


Preparing for Your Private Cloud, Part III: Decide How You Will Provision and...

Standard management practices shouldn’t go away when you adopt a private cloud. You should have a way to measure, monitor, and improve its effectiveness. Security policies must be maintained – in fact...

View Article


Beyond the Hype of Consumerization of IT, Part I: The Data

Yes, consumer technology is raging a war against the enterprise, creating a demand for CIO’s to grant access to precious network resources from devices the employee owns. However, many are quick to...

View Article

Beyond the Hype of Consumerization of IT, Part II: The Device and Its Role

Now that you’ve looked at the IT architecture, you need to examine which devices should be enabled to get the data, and how you’re going to deal with them.  There are several approaches to achieve...

View Article

Beyond the Hype of Consumerization of IT, Part III: We Are Ready To Deploy!

Review IT Architecture. Check. Determine Who’s Getting Access To What Device. Check. Reviewed Governance And Lay Out Strategy. Check. Now what? Bridge the IT and Employee Gap By now you’ve found out...

View Article

What Good Are Social Media Security Policies If Nobody Knows About Them?

There’s been lots of talk about the need for organisations to develop policies and employee guidelines for appropriate use of social media in the workplace. These policies would address who is...

View Article


International Cooperation Required To Tackle Global Cybercrime

One of the best things about the Internet is the way it removes geographic barriers and provides access to a global market place and information resource. However these same qualities also enable the...

View Article

Efficiently Securing User Communities with IT Appliances

There are many business challenges that drive the need to secure network access by teleworkers and travelling laptop users: CIOs worry about security breaches eroding customer trust, with subsequent...

View Article


Understanding the Hacker

Many of you, like me, will be aware of the online conference organisation TED (Technology, Education and Design). The conferences are first class, easily digestible and recently featured a journalist –...

View Article

Michigan Cyber Summit – Unisys Takes Part in National Cyber Security...

I just came back from the Michigan Cyber Summit that was hosted by Governor Rick Snyder and Michigan CIO David Behen. This event was the launch site for the National Cyber Security Awareness Month with...

View Article


Consumerization of IT: Moving Beyond Security Concerns for IT Organizations,...

Ok, there are too many articles about how IT organizations are stymied by the proliferation of mobile devices within their environment and their need to secure enterprise data. This is known as the...

View Article

Consumerization of IT: Moving Beyond Security Concerns for IT Organizations,...

Understanding application modernization scenarios – if your enterprise has been around for more than a few years, inevitably you find that some of the applications reside on older mainframes or servers...

View Article

Consumerization of IT: Moving Beyond Security Concerns for IT Organizations,...

Understand the security requirements – security considerations are part of every aspect of secure mobility.  From the devices you decide to support, the applications and access you provide, the...

View Article
Browsing all 63 articles
Browse latest View live




Latest Images