Steve Prentice

Security Audits, Cyberattacks and other Potential Front Line Issues

By Steve Prentice | November 23, 2016

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As

tech

The DDoS That Came Through IoT: A New Era For Cyber Crime

By Steve Prentice | October 13, 2016

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than

HPE

The Lurking Threat Called Passivity

By Steve Prentice | February 22, 2016

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around

HPE

Security: The Goodwill Virus That Keeps On Giving

By Steve Prentice | February 11, 2016

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced.

Hybridization: A Mindset Approach

By Steve Prentice | February 3, 2016

The Social Data Cloud One of the most amazing attributes of the cloud and its related technologies is its sheer openness. New companies and ventures spring up daily, fueled, in some cases, by one single good idea. They launch first

Hybridization: The Executive Roundtable

By Steve Prentice | January 27, 2016

Hybridization When discussing migration to the cloud, the use of hybrid cloud and all other cloud-related issues, people generally place the focus on the technology itself. What sometimes gets overlooked is the group of individuals who are — or at

The Soft-Edged Cloud: A Security Challenge

By Steve Prentice | January 13, 2016

The Cloud Security Challenge The use of the term “cloud” to describe global, offsite, computing and storage technology is apt for a number of reasons; not all of them good. The metaphor succeeds largely when people visualize their data hovering

conferencing cybersecurity

Video Meetings And The Face To Face Conundrum

By Steve Prentice | December 17, 2015

The Face To Face Conundrum Meetings have been a scourge on business productivity for many decades. British comedy genius John Cleese released a corporate training film back in 1976, entitled Meetings, Bloody Meetings, which not only became an instant classic,

Competing Cloud Security Demands Call For Credentialed Professionals

By Steve Prentice | December 11, 2015

Cloud Security Demands Call For Credentialed Professionals It is not possible to stare with absolute clarity into the future. None of us has a crystal ball. But there is certainty in knowing that the path to progress on which our

The Surge Pricing Model And Free Market Economics

By Steve Prentice | December 8, 2015

From Surge Pricing To Surge Payments In a very short period of time, Uber has emerged as a world-changing business philosophy that goes well beyond cars. It represents a new approach to crowdsource-based, on-demand service. It is changing the way