Category Archives: Uncategorized

BlackBerry COO Marty Beard Discusses Good Technology Acquisition

BlackBerry COO Marty Beard Discusses Good Technology Acquisition

Good Technology Acquisition

Today BlackBerry announced plans to acquire Good Technology. For some, this news may be a surprise. That’s why Inside BlackBerry sat down with BlackBerry COO Marty Beard and Good CEO Christy Wyatt to discuss how the two companies are coming together to deliver on a combined vision.

IBB: There’s history here with BlackBerry and Good. Can you give us that background?

MB: Some people may not realize it, but BlackBerry and Good have both been delivering secure mobility for more than a decade. Our industry is very competitive and is constantly evolving, so it’s not surprising that we’ve each taken some aggressive positions over the years. But when you look more closely, you see that we share a common heritage in security and our strengths complement each other incredibly well. With this deal, we will move forward together with the same mission and commitment that has always driven our companies separately: to provide customers with the best and most secure products, services and support to meet their enterprise mobility needs…

Continue Reading: Blogs.BlackBerry.com

Flying Into The Cloud –  FAA Moves Into High Gear

Flying Into The Cloud – FAA Moves Into High Gear

Computer Sciences Corporation Inks Large Deal

In a big move earlier this week, the Federal Aviation Authority (FAA) inked a deal worth more than a hundred million dollars with Computer Sciences Corporation to provide cloud computing services. The deal generated quite a bit of news coverage earlier this week, but we want to take a moment to explain why this is such a big development and what it could mean for the cloud computing industry. Over the past few years the Federal government has emerged as one of the most aggressive proponents of cloud technologies, and numerous federal agencies have begun to move data and services into the cloud.

It should come as no surprise then that the Federal Aviation Authority has a big interest in cloud computing. When it comes to air safety, speed and coordination are essential and cloud computing makes it easy for teams and people to coordinate over vast distances. This helps explain why the FAA just forked over $108 million dollars to Computer Sciences Corporation (CSC) to handle the federal agency’s cloud computing needs. In this case, CSC has promised to deliver cost effective data center consolidation and cloud migration capabilities, among other things.

shutterstock_2414472

(Image Source: Shutterstock)

Specifically, CSC will be working to consolidate the FAA’s vast network of data centers, and to migrate the agency’s data and hardware systems into a sort of hybrid cloud platform. CSC will be using its own Agility Platform to handle cloud management, and to deliver an effective and efficient migration to the cloud. The company won’t be working on its own, however.

CSC will be using cloud services provided by Amazon and Microsoft in order to handle the FAA’s cloud demand. Over the course of the next 10 years, the deal with the FAA could be worth as much as a billion dollars. Both companies will be providing the data space necessary for the FAA to migrate data into the cloud. While Amazon is most well-known as an online retailer, and Microsoft is known for its ubiquitous computer operating system, the recent FAA deal supports the growing belief that cloud computing could emerge as one of the most important business segments for both companies.

What’s perhaps most interesting about the FAA’s investment is how large of an investment they are making at a time of across the board budget cuts. The United States government is under a lot of pressure to cut costs, and big deals tend to carry a lot of scrutiny. For the Federal Aviation Authority, however, cloud computing could potentially turn out to be big a money saver. Investments in cloud computing have the potential to deliver huge savings, especially in regards to hardware and data storage costs.

That’s why it wouldn’t be a surprise to see investments in cloud computing actually ramp up as the Federal government looks to cut costs. By consolidating data centers and working with industry leaders, like Amazon and Microsoft, the American government may actually be able to cut costs, all while increasing the quality of services provided. The FAA is making some of the most aggressive moves, right now, but in the future cloud computing should be a big investment for the Federal government as a whole.

By Brian Brinker

The Question Of Obedience Towards IT Security Practices

The Question Of Obedience Towards IT Security Practices

Enforcing Security Policies

To comply with global industrial standards, businesses are often required to set up internal security policies. These policies aim to regulate and make transparent the use of digital equipment, networks, and devices for work and pleasure. On some level, the policies are in place to ensure that the organisation has access to certain private, employee domains and devices, while equally encouraging employee dependance on the organisation (and presumed security provider). However, all of this boils down to a common IT issue: the question of enforcing the security practices and policies in place. The basic, underlying issue here is the question of relevance in reference to internal conceptions or external threats, to maximise the probability of obedience and narrow down the chance that one may choose to overlook the standards in place.

Compliance Mechanics

compliance

Classic organisational obedience theories have been built upon various other theories studying the role of fear in ensuring compliance to the policies imposed by an organisation (sovereign in that context). On the other hand, Johnston and colleagues have argued that, in the context of Information Security Policy (ISP) compliance, there are various components to be added and taken into account in order to construct a coherent theory on the ISP compliance mechanics.

The conventional “Fear Appeal Theory” is based on four elements that the subjects were aware of, and thus encouraged behaviors which ensured compliance of the security policy. This theory suggests that if the subject becomes and stays conscious of the severity of a threat, and that it will likely be triggered and have an efficient response, that it will lead to a maximum intent to comply with the policies in place. However, as one can see, this theory is based on violence and animality; in populistic terms it is the same as saying, “do as we say, or we will hit you hard enough so that any reasonable person would make sure not to make the same mistake in order to avoid the punishment.”

Fear Appeal Framework

shutterstock_176125625

Johnston et al argue that the fear appeal framework for the ISP requires more elements, namely related to the rhetorics set up to support conventional elements. This ensures that the intention to comply with security policies is clearly communicated with the proper rhetoric to build up the conceptions of both formal and informal certainty and severity of the sanctions. The division of the informal and formal is relevant here, as to highlight the sanctions on the level of immediate peers, rather than just organisational punishment (social pressure). In this, the authors are in line with the current development of governance models from organisational enforcement towards the persuasion by mere social pressure and attachment to the immediate peers.

However, on the fundamental level, can end up supporting the coercive and violent means, and fail to consider the changing organisational settings. They take for granted the workforce as an industrial resource, and thus validate this type of governance for particular organisations, including inducing fear and stress in people. One should heavily consider the concept of organisational security policies in this context and ask if it adapts and is suitable for modern organisations and conceptions of humanity. This type of fear based theory lacks consideration of the effects of these types intrusive mechanisms on an individuals creativity and character development. As such, this type of practice aims – in the old fashion way – to secure the organisation and its governance, rather than provide any security for the people.

Sources: MIS Quarterly Vol. 39 No. 1, pp. 113-134, Johnston et al./Leveraging Threats through Sanctioning Rhetoric

(Image Source: Shutterstock)

By Kristo Helasvuo

The Five Imperatives For Digital Business

The Five Imperatives For Digital Business

VMworld 2015 – The Imperatives For Digital Business

Pat Gelsinger’s Keynote

CEO Pat Gelsinger’s keynote at VMworld 2015 focused on the future of computing and VMware’s vision of the future. Introductory themes covered the oft-heard topics of ubiquitous connectivity, the simplification of heterogeneous enterprise landscapes that VMware is working towards, and maintaining safe and secure systems on the established backbone while moving forward with the new style of DevOps for new classes of applications.

The Five Imperatives For Digital Business

The keynote was concluded with five “must do’s” for progressive business and IT leaders:

  1. Asymmetry in Business

Gelsinger insisted that businesses have to embrace new models of mobile cloud technology, and noted that vertical industries such as technology, health, education, custom manufacturing, and insurance will change in the near future.

  1. Entering The Professional Era of Cloud

The need for a unified hybrid cloud was highlighted. Gelsinger stated, “It’s not about the big beating the small, it’s the fast beating the slow. So, the most strategic way forward in this space is creating hybrid applications.”

  1. Security Challenge of Protecting People, Apps, and Data

Gelsinger believes businesses have been spending too much money on products that don’t solve security challenges and suggested that only the cost of security breaches has increased more than the cost of security spend. He added, “Some say security should be built in and not bolted on – it’s nonsense. We didn’t have a place to bolt it in. We were just patching it on. We need to put an end to that thinking and now architect in security. It lets us be twice as secure for half the cost.

  1. IT Innovation: Proactive Technology

Businesses need to become proactive instead of reactive, changing the human experience. Applications, Big Data, and analytics can build dynamic technology to help predict almost anything, and that which we find invasive today may be crucial in the future.

  1. Tech-driven Change Reshapes the S&P 500

His final imperative described the decrease in S&P 500 companies, claiming 40% of S&P companies won’t exist in the coming years. Gelsinger stated, “You must break out to stay relevant in this future. Rattle the cage, be the entrepreneur and innovator for your business. It is time to lead the change.”

Diginomica notes, however, that VMware is not responding to future problems in a manner that is likely to be mutually satisfactory to IT, DevOps, and the business. Though their hybrid solutions and unified infrastructures are good in theory, they are only small steps in the right direction, and some industry analysts don’t believe that the view of VMware as the bridge between cloud and on site is correct.

VMware and Elliot Management

There has been much speculation regarding the fate of VMware at the hands of Elliot Management, but no announcement regarding the matter was made. Conjecture was voiced over who will buy who and who will lead, and rumors of leaked Re/code and “tiger team” were heard, but the future of VMware remains a mystery.

Industry Outlook

John Furrier, Stu Miniman, Dave Vellante and Brian Gracely of theCUBE (SiliconANGLE Media team) discussed VMworld 2015, and Farrier believes opportunities for startups are expansive. Miniman believes good innovations have been unveiled, Gracely notes that the industry is slowing make the right moves in the area of DevOps, and Vellante states that the industry can make use of another storage company. Furrier says of VMworld 2015, “VMware was flexing its muscles. The show proved this it is a proud company going to the next level, no matter who is running it.”

By Jennifer Klostermann

Big Data Breaches And What’s Being Done To Mitigate The Problem

Big Data Breaches And What’s Being Done To Mitigate The Problem

Big Data Breaches And What’s Being Done

It’s clearly evident that big data brings a vast amount of positive aspects to both businesses and consumers. However, it’s important to realize what huge data breaches can mean for both parties. Recent disasters such as the Sony Email data breach, Target’s customer information breach, Ashley Madison’s leaked information, and the IRS internal database breach are clear indicators that more needs to be done to protect information stored on the cloud.

The entities that suffer the most from volatile data breaches in recent years are the healthcare industry and financial services industry, being that hackers have dictated that this is the most valuable information to obtain. According to Data Science Central, data breach has now reached up to $154 per record of stolen data, and this could add up to millions for the businesses using big data to run everyday operations. Thankfully there are three enterprise data protection and recovery companies aiming to mitigate the damage that big data breaches and leaks produce when they occur.

Big Data Collaboration 

collaboration-tools

ChaletTech has been around since 2008 and specializes in big audits for large enterprise businesses to monitor user accountability, data security, and data analytics. For ChaletTech, they believe that a breach is inevitable and will occur at some point in time for many, so knowing where and how it happened is crucial towards securing this data in the future.

BigObject Analytics is a relatively new database that specializes in transforming data delivery from 100x up to 1000x times faster than traditional methods of data extraction. It performs best with structured, hierarchal data or star schema.

ProphetStor, a definitive leader in software-designed storage (SDS), scales and distributes customized software storage technologies that manage and simplify data services. Big data takes extensive knowledge of cloud computing platforms to be able to both protect and store efficiently. My analyzing successful deployments, ProphetStore is able to create a customized, highly protected solution for virtually any industry.

What’s Being Done

Recently, these three companies have affiliated with each other to demonstrate what they’re doing in 2015 to prevent data breach, mitigate damage and loss when breaches occur, as well as return the environment back to it’s original form prior to data loss. All three companies are doing thorough database monitoring, exception analysis based on event occurrence, and system restore checkpoints. A recent demo conducted by all three companies showed how integrated their systems are to each other. If a suspicious event occurs within storage, Chalet ADS will investigate and flag an exception. This flagging will trigger BigObject and ProphetStor into action. ProphetStor will snap an image of the database and trace back to the image if necessary. BigObject initiates a CrossLink Analysis, which compares database servers and users based on the original exception and establishes potential risks and behavior trends. The demo showed viewers how data is being analyzed across multiple dimensions and timespans within a very short span of time. It then becomes up to the companies data security team to take the insights gained from these services to investigate problems such as potential breaches and to be able to make a decision based on them.

By Keith Baird

Opera Software Partnership Reaches 5 Million Readers In Africa via Mobile Phones

Opera Software Partnership Reaches 5 Million Readers In Africa via Mobile Phones

Worldreader and Opera Software Partnership

Public Literacy Categories Include Health, Sports, and Love Across 25,000 Book Titles

Worldreader, a global nonprofit dedicated to improving literacy in the developing world through digital books, today announces a new partnership with Opera Software that has provided 5 million readers in Africa access to 25,000 free digital book titles, via their mobile phones. The nonprofit aims to reach 10 million readers with its digital library by the end of 2015.

Worldreader

Mobile Phones in the Developing World

Mobile phones are becoming ubiquitous throughout Africa. For many people, it’s their only window to the connected world as mobile internet infrastructure and coverage is growing fast and driving the cost of data down. These mobile phones are affordable, easy to keep charged, and widely available.

We want to make sure the entire world has access to the books they need and want,” says Elizabeth Hensick Wood, Managing Director for Worldreader, Europe. “Through this partnership, Opera and Worldreader aim to reach millions of people every month, across 34 African countries, through the cell phones they already have.”

For the millions of people in Africa who already use the Opera Mini browser, this makes reading on a mobile phone as easy as making a call,” says Richard Monday, VP Africa, Opera Software. “We’ve placed the Worldreader icon in a coveted space on the Opera Mini speed-dial; right next to the Wikipedia button, because we believe access to reading, and access to knowledge go hand-in-hand. We hope access to these tools will help make our world more connected, empowered, and educated.”

Worldreader_Opera_2015_3

The Impact of Reading in the Developing World

According to a 2014 joint study from Worldreader and UNESCO female readers in the developing world read up to six times more than men, and once women start reading on their phones, they are generally more engaged than men. During one three-month period, women spent an average of 207 minutes per month reading on their phones, compared to just 33 minutes for men. “These findings suggest that making digital books available on mobile phones can help women enormously,” says Wood. “Women can now access information on health, safety, career; topics traditionally unavailable to them.” To see the full report, visit: 2014 joint study from Worldreader and UNESCO

To date, the Worldreader Opera partnership has reached 5 million people in 34 countries across Africa. On a global scale, Worldreader has reached over 6 million readers, adding about 1 million new readers each month through Africa, Asia, and Latin America. The most popular literary categories among these new readers are Love, Sports, Education, and Health.

Making Books Accessible

cloud_57

Since its founding in 2010, Worldreader has observed hundreds of libraries in the developing world which are often closed, under-funded, or lacking in relevant book titles. These conditions often leave would-be-readers with limited access to books and information that they would find useful or relatable. Some libraries were found to have an over-abundance of titles limited to very narrow subjects, or books that no longer contained up-to-date information. Sometimes the books were too worn-out to be used.

While more affluent parts of the world may view digital reading as a luxury, we see it as a necessity in the developing world, where physical books are often non-existent,” says Wood.

The Worldreader Opera partnership provides 25,000 of the best titles from Worldreader’s book publishing partners. The titles were selected to be fresh, relevant, sought-after titles that readers around the globe want to read. Worldreader also selected a variety of titles that may not be widespread but will have particular relevance and significance to many countries in Africa. Titles include works such as Tale of Tamari by Shimmer Chinodya, This Place I Call Home by Meg Vandermerwe, Blossoms of the Savannah by Henry R. ole Kulet, and Asare Konadu’s A Woman in Her Prime.

Reading is a human right that one billion people can’t yet enjoy,” says David Risher, CEO and Co-Founder of Worldreader. “Worldreader and Opera are working together to make sure that books–and the power within them–are available to every single person on the planet to help them reach their full potential.”

To read free books on your mobile phone, visit read.worldreader.org

About Worldreader

Worldreader is a global nonprofit bringing digital books children and their families, empowering them to read, think, and grow in order to improve their lives and their world. In its first five years, Worldreader has reached 5.6 million readers in 69 countries with a digital library of 28,500 local and international e-books via e-readers and mobile phones, and aims to reach 10 million readers with its digital library by the end of 2015 and 15 million readers by 2018. For more information on Worldreader, visit: www.worldreader.org.

About Opera Software ASA

Opera enables more than 350 million internet consumers worldwide to connect with the content and services that matter most to them. Opera also helps publishers monetize their content through advertising and advertisers reach the audiences that build value for their businesses, capitalizing on a global consumer audience reach that exceeds 1 billion. Opera is a trademark of Opera Software ASA.

VMworld 2015 Kicks Off To Lots Of Excitement

VMworld 2015 Kicks Off To Lots Of Excitement

VMworld 2015

VMware’s five-day event has kicked off at the Moscone Center in San Francisco, with VMware “in the midst of a massive transition.” Says Dave Vellante, co-founder and co-CEO of SiliconANGLE Media, “You don’t hear VMware talking about (the ecosystem) anymore. Instead, we’ve seen a navigation through that ecosystem play, and now we see VMware grabbing networking and storage. With all this Federation talk coming back together, maybe EMC is thinking of taking a more Oracle-like approach – so there’s going to be an interesting undercurrent to VMworld this year.”

Day one of the 12th annual VMworld has set a new record for the number of attendees, suggesting that interest in virtualization continues to grow. The conference was kicked off with several announcements, from the new “intelligent automation engine” for efficient use of data center equipment to new open source tools.

vCloud Air Enhancements

VMware has announced various vCloud Air enhancements, now allowing companies to test and run disaster recovery plans in vCloud Air’s new Site Recovery Manager Air. Disaster recovery on vCloud Air is based on usage, instead of being part of a subscription. Additionally, the first new product cominIT out of VMware and Google’s reseller relationship, vCloud Air Object Storage, has been introduced.

Grid 2.0

And NVidia has announced the launch of the latest version of its desktop virtualization technology, Grid 2.0, which allows companies to remotely deploy graphics-heavy applications. Servers with Nvidia Grid boards allow the use of virtualization software such as VMware vSphere 6 and Horizon 6 and Citrix’s XenApp, XenServer, and XenDesktop to share the GPUs power with Grid 2.0, and this new release doubles previous capacity, managing up to 128 users per server. Moreover, Grid now supports Linux OS as well as Windows OS, and the technology is able to run on blade servers in addition to rack servers.

Integrated OpenStack 2.0

The launch of VMware Integrated OpenStack 2.0 has also been announced, the second release of the company’s distribution of the OpenStack open source cloud software. Based on OpenStack Kilo, the new version will become widely available by the end of September. Customers will be able to upgrade from Icehouse (V1.0) to Kilo (V2.0) and roll back if necessary in, according to VMware product line manager Arvind Soni, “a more operationally efficient manner.”

Containers

core-os

Two new products for companies to build and run applications inside of containers, Photon Platform and vSphere Integrated Containers, are also being discussed. Containers provide an alternative to virtual machines, and VMware believes this new technology underlies many existing technologies including Google-led Kubernetes, Docker’s Swarm, CoreOS’ Rocket, Mesosphere-led Apache Mesos, and Cloud Foundry. These can all integrate with vSphere Integrated Containers.

Container Specific Storage Provision

VMware has teamed up with startup ClusterHQ to develop a storage driver allowing ClusterHQ’s Flocker open source software to play with VMware’s vSphere server virtualization software. This lets companies provision storage not only for virtual machines but for specific containers, with storage software such as vSphere Virtual Volumes and Virtual SAN.

EVO SDDC

A new suite of software including several existing VMware tools for managing data center resources, EVO SDDC, was also debuted and includes a new “automation engine” as well as open source hardware management software. Existing tools handle storage, server, and network virtualization and include Virtual SAN, vSphere, vRealize Operations, and NSX. With server virtualization being the foundation of VMware, the company is now also making the other, less widely utilized, pieces a standard.

For more news of this year’s VMworld, take a look at the General Session Replay. The event continues to provide in-depth training and hands-on experience, product research and analysis, and networking opportunities for industry experts. And check out IT Process Automation and VMware for a discussion of managing virtual tasks with a central administration tool.

By Jennifer Klostermann

Wearable Tech News: Google Android Wear Now Works With iPhone

Wearable Tech News: Google Android Wear Now Works With iPhone

When you wear something every day, you want to be sure it really works for you. That’s why Android Wear offers countless design choices, so you can find the watch that fits your style. Want a round watch with a more classic look? Feel like a new watch band? How about changing things up every day with watch faces from artists and designers? With Android Wear you can do all of that. And now, Android Wear watches work with iPhones.

Android Wear for iOS is rolling out today. Just pair your iPhone (iPhone 5, 5c, 5s, 6, or 6 Plus running iOS 8.2+) with an Android Wear watch to bring simple and helpful information right to your wrist…

Read Article: Google

CloudTweaks Comics
The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by 10-20%. This infographic provided…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…