The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Nikkhoo

The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the moving parts (like users and applications) are themselves evolving and changing. This creates unique challenges in operational efficiencies, core competency support, compliance observance and risk management.  The central theme to all these challenges is establishing and maintaining control of applications which serve as gateways to all the valuable data (personal, trade secrets and other IP) on which an enterprise exists. Many companies have turned to an identity management solution which administrate and validate the digital identities of authorized users. This is not a new concept, nor is it a foreign practice to many established enterprises. Identity management combined with controlled and channeled access is a recognized best practi... (more)

Attacks from Within

So much is written about the events outside your perimeter; those nefarious and shadowy individuals and offshore syndicates who are looking to steal technology or personal data or piggyback on your servers to peddle everything from pirated products to pornography, implant botnets or viruses, or simply to create corporate chaos. With all that weighing on our collective IT asset protection strategies, it is easy to miss what a new Carnegie Mellon report is pointing to as one of the fastest growing threats…insider breaches. Even KPMG says this threat has tripled since 2007. They co... (more)

The Challenge of Herding Cats: Your SaaS Portfolio and Security

It’s obvious the rise of SaaS (software-as-a-service) has changed the game. The benefits of subscribing to a cloud-based application service are already well-known and documented: cost-efficiencies, speed, hands-off maintenance, etc… It’s no longer an emerging practice and, for most IT managers, has become an inextricable component of any go-forward IT network strategy. What this means is now there are dozens of new sign-ons per user from a variety of endpoints (including mobile and tablet). And if we are talking enterprise-wide deployments, this is can be as challenging as herdi... (more)

Lessons Learned from LinkedIn

Users are making it too easy for hackers. If we take a closer look at the 6.5 million hashed LinkedIn passwords that leaked we find a large swath of the user population are ignoring warnings of overly simplistic and obvious passwords. Would you believe the most common word or phrase found in a 160K sampling of the list was “link”? And would you further shake your head in disbelief that “1234” and “12345” followed close behind. Rounding out the top 10 were “work,” “god,” “job,” “angel,” “the,” “ilove,” and “sex.” More so than Facebook, LinkedIn is the social media of choice for bu... (more)

The Genie, The Bottle and BYOD

It’s safe to say the genie is out of the bottle. The rise of employees (and other credentialed users) using their own smartphones, tablets and other personal devices is rising and there’s little to nothing  IT can do about it…or is there? In the past weeks I’ve written about BYOD and password management, but I want to approach the subject from a slightly different perspective. Administrating access management and identity management from the cloud is a cost-effective and nearly-instantaneous way to quickly create, manage and enforce a BYOD initiative. But in the end, it comes do... (more)