Building Your Business Cloud Strategy

Building Your Business Cloud Strategy

Cloud Brokers And Strategies  Comprehensive digital transformation of your business will require extensive involvement of your CIO through each level of business evolution, ensuring data is protected and efficiently utilizing in-house IT infrastructure for maximum effect in hybrid cloud models. Flexibility is integral to the design, and instead of fitting into an as-built service, developing…

Cloud Pinup: BrightPoint Security – Hyper Threat Intelligence

Cloud Pinup: BrightPoint Security – Hyper Threat Intelligence

Cloud Pinup: BrightPoint Security  Cyber threats become more and more sophisticated with every passing year and companies are being forced to respond with full-time, exhaustive security information and event management (SIEM). Precious resources that would otherwise be deployed in the interests of growth and servicing consumers needs are often diverted to maintaining the security of a…

Big Content – Big Data’s Unruly Step-Child

Big Content – Big Data’s Unruly Step-Child

Big Content Big Content is a lesser known buzzword in the data world that’s experienced a few definition shifts. In 2012, Gartner’s Craig Roth indicated Big Content to be the unstructured step-child of Big Data, representing the multitude of blogs, tweets, posts, vines, and similar content being created at an increasing rate. Idio suggested Big…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…