Making Business Resiliency Part Of Business As Usual

Making Business Resiliency Part Of Business As Usual

Making Business Resiliency Part of Business As Usual Business continuity and disaster recovery (BCDR) have become non-negotiable requirements for virtually every IT department. Business resiliency is an umbrella concept that must address everything from basic business continuity to high-level risk management, security, crisis management, and more. With today’s IT architectures supporting servers, networks, and applications,…

Cloud Accounting – The Back Office Promise

Cloud Accounting – The Back Office Promise

Cloud Accounting – The Back Office Promise The promise of platform as a service is very simple: Bring your code, and cloud vendor will handle everything else for you. Users build their applications with the vendor’s tools, APIs and supported programming languages. Platform as a service model of cloud computing increases programmers’ productivity, reduces development…

DreamHost Debuts Havana Version Of Its DreamCompute OpenStack Cloud

DreamHost Debuts Havana Version Of Its DreamCompute OpenStack Cloud

DreamHost Debuts Havana Version of Its DreamCompute OpenStack Cloud  Continuous Integration Approach Delivers Powerful New Features in Real Time LOS ANGELES, California—November 4, 2013—DreamHost®, a global leader in Web hosting and cloud services, today announced an upgraded Havana version of its DreamCompute™ public cloud computing service, and significant new levels of OpenStack™ code and community…

PayScale – Evolving Over The Years To Offer More Than Just Salary Reports

PayScale – Evolving Over The Years To Offer More Than Just Salary Reports

PayScale –Evolving Over The Years To Offer More Than Just Salary Reports Last Thursday was a great day, not only for carving pumpkins and trick or treating, but for talking with Tim Low, VP of Marketing at PayScale about salaries, big data collection and the evolution of PayScale’s services. PayScale, founded in 2002 out of Seattle, Washington,…

10 Steps To Success With The Cloud

10 Steps To Success With The Cloud

10 Steps To Success With The Cloud The cloud, the trend that appears to be steaming on ahead as the likes of Salesforce, Amazon’s Web Services and Workday continue to gain market value. Utilising cloud services for business has allowed for companies to scale, drive IT costs down and become a more agile, streamlined business.…

Cloud Infographic: Machine Big Data

Cloud Infographic: Machine Big Data

Cloud Infographic: Machine Big Data Did you know that Chevron manages as much data as Google? Here is a colorful infographic provided by TIBCO Software called “Taming The Monster Of Machine Big Data” which provides some interesting facts on how Big Data is being accumulated. Infographic Source: http://spotfire.tibco.com

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…