Most Recent Blogs

Managing IT Risk Associated with Mobile Computing Security

Posted: April 08, 2014   /   By: Jon Oltsik   /   Tags: IBM, End-User Computing, Check Point, Fortinet, Cisco, Information and Risk Management, mobile, Security and Privacy, Security, BYOD, Citrix, data security, Fiberlink, android, Dropbox, Good Technology, Airwatch, Blue Coat, CISO, Bit9, Anti-malware, Facebook

When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk. Why? Many CISOs I spoke with at the time said it was purely a matter of scale. All of a sudden, large enterprises had thousands of additional devices on their networks and they struggled to figure out what these devices were doing and how these activities impacted organizational risk.

Read More

Has Mobile Computing Had a Positive Impact on Cybersecurity?

Posted: March 11, 2014   /   By: Jon Oltsik   /   Tags: IBM, MDM, Cisco, Information and Risk Management, Juniper, HP, mobile, Security and Privacy, Security, endpoint security, Bradford Networks, Mobile computing, Box, Dropbox, Aruba, Vormetric, ForeScout, Veracode, Great Bay Software, NAC

I’ve heard the same story from a multitude of CISOs: “As soon as we agreed to support BYOD and mobile devices, all hell broke loose!” How? All of a sudden there were hundreds or thousands of new devices accessing the corporate network. Many of these devices were employee-owned, unmanaged, and full of questionable applications. What’s more, users were now working on multiple devices and moving sensitive data between Windows PCs, iPads, Android phones, and a slew of online file sharing sites like Box, Dropbox, and iCloud. Holy threat and vulnerability, Batman!

Most enterprise organizations are now way past this early period of mobile security chaos. Yes, there are still plenty of challenges associated with mobile computing security, but did preliminary mobile computing anarchy have any positive impact on information security in the long run? In other words, did the initial mobile computing fire drills actually help CISOs recognize risks and address systemic weaknesses?

Read More

IT's Consumerization Compliance Conundrum

Posted: March 16, 2012   /   By: Steve Duplessie   /   Tags: Information and Risk Management, Security and Privacy, Amazon, Box, Dropbox

Special thanks to Terri McClure for coming up with this one.

Read More

Files Are Killing IT - And Creating A New Market Opportunity

Posted: March 06, 2012   /   By: Steve Duplessie   /   Tags: IBM, Storage, Netapp, EMC, IT Infrastructure, HP, Box, Dropbox

Data growth is what destroys everything in IT operationally. If data stopped growing, you could actually fix all of your issues once and for all. You would be stable. What a concept!

Read More

Posts by Topic

see all