The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Nikkhoo

There’s data. And then there’s BIG DATA. Many of us have been bombarded with the term in many frameworks. There are some professionals that chalk it up to marketing hype or meaningless buzzword. Personally, I prefer the way Gartner categorizes it. That it is more than size. It is a multi-dimensional model that includes complexity, variety, velocity and, yes, volume. But the pressing issue with this definition of Big Data is how best to secure something so vast and multifaceted. If you recognize the old concept of a network perimeter is antiquated and dangerously narrow, there should be some concern as to corralling all this data and ensuring its transit and storage is protected. The latter issue speaks directly to compliance needs. Banks and other financial institutions, medical facilities, insurance, retailers and government entities are especially sensitive to the ... (more)

It’s a Wonderful Cloud-a Security Carol

Happy holidays to all of you and may the season keep your perimeters protected, your assets secure and your networks free of nasty little elves! Twas the night before Christmas and all through the net No access was stirring; No hackers as yet. Murphy in sales was showing his app Tweeting and downloading with only a tap I grumble and moan ‘cause I know it to be. That his iPhone and iPad was BYOD Then out on the site there arose such a clatter, I sprang from the help desk to see what was the matter. Without my UniSec dashboard, I would not know If the network alert meant friend or meant fo... (more)

PCI Compliance for Retailers from the Cloud Perspective

One of the key drivers to IT security investment is compliance. Several industries are bound by various mandates that require certain transparencies and security features. They are designed to mitigate aspects of risk including maintaining the sacrosanctity of customer information, financial data and other proprietary information. One such affected vertical is retail. No matter if you’re Wal-Mart or Nana’s Knitted Kittens, if you store customer information; if you process payments using customer’s credit cards, you are required by law to comply with a variety of security standar... (more)

So, Just What Is REACT? And How Does It Change Security Strategies?

Last month, I published an article about a new unified security platform called REACT (Realtime Event & Access Correlation Technology).  All in all, it received some very positive notices, but also raised some questions as to what exactly the platform is, and why it should matter. Simply put, REACT is an approach whereby an organization leverages the capabilities of several security solutions into one central correlated repository of security intelligence. For instance, key information from an Access Management tool (such as SaaS SSO logins or views of/modifications on/additions... (more)

Governance Must Drive All Security Initiatives... Even Cloud

“The ‘how’ may change, but the ‘what’ is fundamental to risk management.” I heard these sage words at a recent ISSA (Information Systems Security Association) meeting from a CIO speaking about security from the cloud. He continued, “Risk is not unique to the cloud. It experiences the same issues that affect any outsourcing or third party deliverable. It is bounded by the same concerns regarding governance—does it meet the requirements of my industry? Is my data free from co-mingling? Are the proper notification protocols in place?” Do a Google search on “cloud security” and the ... (more)