Category Archives: Technology

DO YOU REALLY KNOW WHAT TWO-FACTOR AUTHORIZATION IS?

DO YOU REALLY KNOW WHAT TWO-FACTOR AUTHORIZATION IS?

Two-Factor Authorization Two-factor authorization. Most of us think we know what it is, but a recent news event brought something alarming to my attention: even huge companies misunderstand what two-factor authorization means, and your personal information could end up at risk because of this. Let’s start with this recent report: United Airlines changed its security…

TWEAKING WITH APPLICATION ASSESSMENT TOOLS

TWEAKING WITH APPLICATION ASSESSMENT TOOLS

Application Assessment We have all seen the TV commercial where impossible situations are solved quickly by simply pressing a button market “Easy.” For many organizations, the cloud presents a difficult transition. Over the past few years as a consultant helping organizations consider cloud computing, I have developed a number of useful tools to help customers…

TO MIGRATE OR TO NOT MIGRATE: IN-HOUSE VS. OUTSOURCED CLOUD COMPUTING

TO MIGRATE OR TO NOT MIGRATE: IN-HOUSE VS. OUTSOURCED CLOUD COMPUTING

In-House vs. Outsourced Cloud Computing Through working as an executive in the managed DNS industry for over 15 years, I have become a sort of expert in managing costs while also maintaining high performance and uptime standards. With the recent push the cloud, I have been urged to evaluate the cost efficiencies between operating an in-house…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

DELUSIONS OF ADEQUACY: WHY PRESIDENTIAL POLICY DIRECTIVE 41 FALLS SHORT

DELUSIONS OF ADEQUACY: WHY PRESIDENTIAL POLICY DIRECTIVE 41 FALLS SHORT

Delusions of Adequacy President Obama’s recent policy directive on cybersecurity was eight years in the making. Unfortunately, its proposed actions are barely adequate to the massive task of defending against the onslaught of daily cyber attacks on U.S. companies and government agencies. The new document, Presidential Policy Directive 41, is supposed to improve government and…

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

IDENTITY AND ACCESS MANAGEMENT: ADVANCING TO MEET THE CHANGING NEEDS OF PASSWORDS, GOVERNANCE

IDENTITY AND ACCESS MANAGEMENT: ADVANCING TO MEET THE CHANGING NEEDS OF PASSWORDS, GOVERNANCE

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be…