Identity Management in the Cloud: A Matter of Function, Control, Cost
I was flipping around the 320 channels on TV yesterday and came across an old episode of Seinfeld. It’s the one where Jerry is asked to fill in as a doorman for a high rise. While standing sentry, he...
View ArticleCasting Light on Shadow IT and ID
It’s not a new term or concept. You probably recognize that it’s happening within your own organization. Shadow IT is the appropriation and use of IT assets and applications without organizational...
View ArticleFFIEC’s recognition of cloud security advantages is good for modest financial...
Last month the Federal Financial Institutions Examination Council (FFIEC) shared an opinion on the viability and security of cloud computing. In the four-page statement, the interagency body empowered...
View ArticleREACT to the Cloud: A tale of horror and unified security
Today’s is a cautionary tale. One that you’ve probably heard before, but I promise a new spin on making sure it won’t happen again. It’s a true story. It recently happened to a colleague’s friend’s...
View ArticlePreventing Data Leakage: Proactive Security from the Cloud
In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC,...
View ArticleA de-provisioning proverb: When a door closes, just make sure you don’t leave...
Earlier this week I attended a local cloud developers group, and I met a gentleman who consults with companies to engage in deep dive forensic examinations of their networks. He looks for the virtual...
View Article
More Pages to Explore .....