One of the true benefits of the cloud is the ability to reconfigure and
create a stronger, more active asset protection strategy than you might be
able to otherwise afford. But let’s look beyond the cost factor for a
moment and analyze a true best practice that gives an organization a true
advantage within the cloud and an overall strategic deployment of security
To look at the future of security configuration we have to look back 500
years into the mists of history to see a model that worked well then…and
works just as well today. I’m talking specifically of the castle. In terms
of a current strategic deployment let’s call it the layered prevention
model. In its day the castle was a state of the art defense strategy. In the
center you have the king (and the king’s most precious possessions).
Surrounding the king are his elite and trusted guards armed an... (more)
I was chatting with an IT professional about the benefits of cloud-based
security and he kept referring to a recent risk assessment he performed. (And
if you haven’t done this lately, you should) But what got the gears in my
head turning is how interchangeably he used the terms “risk” and
Now on the surface they seem like the same component of security management.
I tend to disagree. In its simplest of terms, risk the probability or
frequency of doing harm while threat is the actual or attempted infliction of
that harm. Tomato, tomahto? Splitting hairs? It’s all about ... (more)
It’s obvious the rise of SaaS (software-as-a-service) has changed the game.
The benefits of subscribing to a cloud-based application service are already
well-known and documented: cost-efficiencies, speed, hands-off maintenance,
etc… It’s no longer an emerging practice and, for most IT managers, has
become an inextricable component of any go-forward IT network strategy. What
this means is now there are dozens of new sign-ons per user from a variety of
endpoints (including mobile and tablet). And if we are talking
enterprise-wide deployments, this is can be as challenging as herdi... (more)
It’s safe to say the genie is out of the bottle. The rise of employees (and
other credentialed users) using their own smartphones, tablets and other
personal devices is rising and there’s little to nothing IT can do about
it…or is there?
In the past weeks I’ve written about BYOD and password management, but I
want to approach the subject from a slightly different perspective.
Administrating access management and identity management from the cloud is a
cost-effective and nearly-instantaneous way to quickly create, manage and
enforce a BYOD initiative. But in the end, it comes do... (more)
It's not a new term or concept. You probably recognize that it’s happening
within your own organization. Shadow IT is the appropriation and use of IT
assets and applications without organizational approval. And it happens
more than you know. Sally the sales rep gets a label template design
application, Marco from HR downloads software that manages inbound resumes.
Kelsey in marketing signs up for a WordPress page and social media accounts.
All too often, employees are not going through corporate channels to get what
they need to achieve their goals.
And every time they do, the ... (more)