recentpopularlog in

jonerp : security   111

« earlier  
Machine learning, the dark web and cybercrime – an unholy trinity
"What should we expect in the on-going arm-wrestle with cybercriminals as malware gets smart, devious and hard to find?"
digital  government  and  public  services  governing  identity  privacy  security  iot  robotics  ai  machine  intelligence 
4 days ago by jonerp
Trust and relevance – the twin challenges SAP faces as it meets with SAP UK & Ireland User Group - by @dahowlett
"SAP UK & Ireland User Group meet this week. SAP will face some testing questions. Here is my pre-event assessment around the top of mind topics."
cloud  erp  financials  and  supply  chain  future  of  work  regulation  security  event  reports 
16 days ago by jonerp
Australia's war on encryption potentially 'reckless': Former US cyber advisor
"Demands for more access to private data and control over personal communications devices 'sounds a lot like China', says Obama's director for Cybersecurity Policy."
security 
5 weeks ago by jonerp
Facebook's plan to throw humans at security, manipulation issue won't work, equates to indictment on AI progress
"Throwing humans at Facebook's fake news and security issues isn't likely to fix the company's issues. Facebook needs more AI and automation to correct ills before engagement falls."
security 
5 weeks ago by jonerp
Social media giants need to up their game as US Senate grills them - by @whostu
"Twitter, Google and Facebook go in 'lawyered-up' to answer US Senate questions on Russia and the Presidential Election. The result - holding positions and obfuscation."
digital  government  and  public  services  machine  intelligence  ai  security 
5 weeks ago by jonerp
Your data is more secure with SaaS companies than it is with you
"Conventional wisdom says you should protect your data by keeping it close. In reality, it's more secure with SaaS companies, says New Relic's Lee Atchison"
cloud  platforms  -  infrastructure  and  architecture  data  privacy  new  relic  partner  zone  security 
6 weeks ago by jonerp
Enterprise hits and misses – accountants overcome big data denial, CIOs fight for digital trust - by @jonerp
"This week: accountants move past big data and AI denial, while Walmart and Disney make aggressive moves against rivals. CIOs fight for digital trust after data breaches - and your weekly whiffs."
hits  and  misses  iot  robotics  ai  security 
7 weeks ago by jonerp
72 hours to doomsday – GDPR armageddon peddling from Splunk
"Splunk’s security evangelist Matthias Maier posits some thoughts on what is important when it comes to managing GDPR in action."
data  privacy  digital  government  and  public  services  governing  identity  security  regulation 
9 weeks ago by jonerp
Why the era of political pride in tech ignorance has to end - by @whostu
"The British Home Secretary wears her tech ignorance with pride. Sadly she's not alone, on both sides of the Atlantic. It's time for a digitally-savvy generation of policymakers."
governing  identity  privacy  and  security 
9 weeks ago by jonerp
Enterprise hits & misses – Avoiding security worst practices while Microsoft Ignites and Oracle opens - by @jonerp
"In this edition: Security best practices revealed - but worst practices are all too common. Plus: wrapping a big event week with Microsoft Ignite and kicking off Oracle OpenWorld. And: your weekly whiffs."
data  privacy  hits  and  misses  security 
9 weeks ago by jonerp
OOW17 – eliminate human labor, eliminate human error - by @whostu #OOW17
"Larry Ellison wants to eliminate human labor and in the process eliminate human error and he's going to do it at half the price that Amazon would. Oracle OpenWorld is underway!"
cloud  platforms  -  infrastructure  and  architecture  digital  government  public  services  iot  robotics  ai  security 
10 weeks ago by jonerp
Is the US ready for election hacking 2018?  No way.
"With 2018 U.S. elections looming, the government has done little to reinforce the security of the American electoral process in the aftermath of what intelligence agencies agree was a major Russian cyber operation designed to sway the 2016 Presidential contest."
digital  government  and  public  services  identity  regulation  security 
10 weeks ago by jonerp
Study reveals IT security and risk management need work at all companies - by @dahowlett
"Now in its 13th year, Computer Economics IT Management and Best Practices 2017/18 reveals significant deficiencies in many areas of security and risk management. As you might expect, large companies are best equipped to deal with threats but as always, the devil is in the detail."
security 
10 weeks ago by jonerp
Deloitte hacked, a brown trousers moment? - by @dahowlett
"Deloitte has managed the extraordinary feat of holding the world's leading cyber security consulting firm position as assessed by Gartner while confessing to being hacked."
data  privacy  governing  identity  and  security 
11 weeks ago by jonerp
Building security by design – a discussion of VMware App Defense - by @krmarko
"Recent hacking scandals point up the need for security by design. Here is one approach that looks promising."
infrastructure  security 
12 weeks ago by jonerp
Equifax and beyond – where does enterprise data security go from here? - by @jonerp
"The alarming Equifax breach has inflamed the news cycle. In my back and forth with a frustrated cybersecurity expert, we hashed out what individuals - and companies - can do to change enterprise data security."
data  privacy  governing  identity  and  security  regulation 
september 2017 by jonerp
Okta API strategy aims to bridge gap between customer experience and security - by @derek_dupreez
"The cloud identity management vendor kicked off its annual customer event in Las Vegas today with a number of announcements that expand the Okta platform."
cloud  platforms  -  infrastructure  and  architecture  crm  customer  experience  governing  identity  privacy  security 
august 2017 by jonerp
Microsoft warns of new tech support scam approach
"The new email campaigns use reputable brands to trick users. Microsoft has published some of the emails it has captured. These appear to come from big brands such as Alibaba, Amazon and LinkedIn. They all contain links that if examined are not to the sites they claim to be from. The reason these emails succeed is that people often take the email at face value, trust the brand and just click on the link without thinking about it."
homepage  slider  latest  news  security  cyber  email  linkedin  malware  microsoft  exchange  office  365  outlook  scammers 
august 2017 by jonerp
Former CIA operative Valerie Plame says privacy is precious — and she should know
"“There are two sides [to privacy]: the corporate side, which is doing this to sell you more [stuff]. Then there is the government area and a whole other area with the NSA and their efforts to keep us safe — and it has spilled over into privacy. There is an ongoing tension between security and privacy,” she says."
privacy  security  tc  valerie  plame  identity  management  cloud  summit 
august 2017 by jonerp
Wake up America – GDPR is not that far away - by @denispombriant
"Good morning America. New rules keep on coming and May 2018 sees the ushering in of GDPR. As with the topics like revenue recognition rules, researchers say we’re not ready. Time to get educated."
data  privacy  governing  identity  and  security  regulation  gdpr 
august 2017 by jonerp
Enterprise hits and misses – AI woos cybersecurity, McDonalds goes digital - by @jonerp
"This week: Can AI give companies the edge over cybercriminals? Will McDonalds become as digital savvy as Starbucks? Your whiffs include a blockchain post on a no-elbow-grease diet."
hits  and  misses  iot  robotics  ai  security 
august 2017 by jonerp
Can Facebook and Harvard save U.S. elections with Defending Digital Democracy?
"Harvard has launched a major new project called “Defending Digital Democracy” designed to overcome election hacking and protect the U.S. democratic process. Is it enough to make up for Executive Office skepticism and inaction?"
digital  government  and  public  services  governing  identity  privacy  security 
july 2017 by jonerp
Cisco warns of DeOS attacks
"The use of the Internet of Things (IoT) by hackers has been well documented. A significant part of the problem is the lack of security in too many Internet connected devices. Enterprise IT departments often have no say in the purchase of many of these devices. Security cameras, fridges, televisions and other goods are often purchased by different departments. Few of them have any security training."
homepage  slider  latest  news  security  cisco  cyber  ddos  deos  iot  not  petya  nyetya  ransomware 
july 2017 by jonerp
SAP South Africa – the company speaks about alleged corruption = by @dahowlett
"What happened at SAP South Africa such that the company got clobbered with allegations of corruption? We talked with Adaire Fox-Martin, head of EMEA to get an update."
central  regulation  security 
july 2017 by jonerp
The Risks of DNS Hijacking Are Serious and You Should Take Countermeasures
"Enabling HTTPS for all web apps and services hosted on a domain name should be a top priority. This will protect users from man-in-the-middle attacks in general and has many other benefits, like the ability to turn on HTTP/2 and gain a significant performance boost. However, to mitigate the effects of DNS hijacking, HTTPS needs to be combined with a security mechanism called HSTS."
analysis  technology  top  stories  dns  hijacking  dnssec  domain  name  system  security  extensions  gandi  http  strict  transport  https  registrar 
july 2017 by jonerp
Stay Out of Security Breach Headlines: 3 Things That Must be Addressed in your Cloud Agreement
"It is important to mention that many cloud vendors will resist such requests, stating that in order to keep costs competitive they need to standardize on security policies in a one-size-fits-all approach that applies to all customers. Therefore, the cloud vendor will claim they simply cannot customize the cloud solution and associated services to match unique customer security requirements."
application  management  services  cloud  erp  program  security  data  breach  protection  risk 
june 2017 by jonerp
The IoT-enabled police officer – building a digital law enforcement future
"The IoT should be about more than intelligent toothbrushes and self-ordering fridges. Police forces worldwide could benefit from IoT tech potential."
digital  government  and  public  services  iot  robotics  ai  regulation  security 
june 2017 by jonerp
How AWS And Azure Competing Is Improving Public Cloud Adoption - by @louiscolumbus
"Only 37% of current Azure users expect to add or replace their Public Cloud provider, compared to 53% of current AWS users and 50% of GCP users. The study found that approximately 40% of respondents expect to add or replace their cloud provider in the next two years, compared to 43% who predicted that last year. Companies who have adopted Microsoft Azure are least likely to replace/add other vendors, as only 37% of current Azure users expect to add or replace, compared to 53% of current AWS users and 50% of GCP users."
business  featured  posts  amazon  aws  web  services  security  cloud  computing  landscape  louis  columbus'  blog  saas  early  adopter  research  economics 
june 2017 by jonerp
The Junior Dev Who Deleted the Production Database
"The top response on Hacker News also had no sympathy for the company. “Sorry, but if a junior dev can blow away your prod database by running a script on his _local_ dev environment while following your documentation, you have no one to blame but yourself. Why is your prod database even reachable from his local env? What does the rest of your security look like? Swiss cheese I bet.”
culture  technology  top  stories  amazon  web  services  data  databases  reddit  forums  security  tech 
june 2017 by jonerp
Theresa May criticised for blaming London’s terror attack on the Internet - by @derek_dupreez
"Prime Minister Theresa May has said that the Internet allows those with extreme views a “safe space” to feed and breed their ideology."
data  privacy  digital  government  and  public  services  governing  identity  security 
june 2017 by jonerp
The FCC plan to kill net neutrality
"Abolishing the Obama-era net neutrality rules is a priority for the Federal Communications Commission and this time public opinion may not be enough to turn the tide."
digital  government  and  public  services  governing  identity  privacy  security  infrastructure  regulation 
may 2017 by jonerp
Enterprise hits and misses – diginomica on cybersecurity, SAP and Salesforce on tour - by @jonerp
"In this edition: diginomica does cybersecurity, while AI alarmists meet an optimist. Salesforce has a world tour and SAP had a big show - we've got your breezy roundup. Grappling with workplace diversity is one theme this week; pizza is another. Food-related whiffs abound, with Pizza Hut asking for - and receiving - viral shaming. Finally, can AI ever make better music than the Biebs?"
diversity  hits  and  misses  security 
may 2017 by jonerp
Using deep learning to thwart malware – even WannaCry - by @krmarko
"How startup Deep Instinct uses deep learning AI technology to detect undocumented malware and might have thwarted last week's WannaCry ransomware outbreak."
infrastructure  machine  intelligence  and  ai  security 
may 2017 by jonerp
Security Debt is an Engineer’s Problem
"She shared four basic security principles for engineers. First, security debt is expensive. There’s a lot of talk about technical debt and she thinks security debt should be included in those conversations.

“This historical attitude is ‘We’ll think about security later,’” Plattner said. As companies grab the low-hanging fruit of software efficiency and growth, they ignore security, but an initial insecure design can cause problems for years to come."
analysis  events  top  stories  bcrypt  oracle  passwords  security  technical  debt  women  who  code  zxcvbn 
may 2017 by jonerp
Who Let the Bug Out? Is the NSA Responsible for “WannaCry?”
"Do American spy agencies have a responsibility to tell software manufacturers about dangerous potential exploits they may find in their products?"
digital  government  and  public  services  security 
may 2017 by jonerp
Enterprise hits and misses – quick hit Sapphire Now special, plus cyber insecurities via WannaCry
"As for the financials, the GP Investments Acquisition Corp. will issue 63.8 million shares of its stock at $10 a share to Rimini Street Shareholders. Cash to GP Investments Acquisition Corp. will close the deal, cut debt and bolster the balance sheet. GP Investments Acquisition Corp. will hold 25 percent of Rimini Street shares.

Rimini Street said the enterprise value for the combined company will be about $837 million, or 2.8x estimated 2018 revenue of $295 million."
hits  and  misses  security 
may 2017 by jonerp
Will Trump’s cyber-security Executive Order work?
"It's been a busy week for President Trump, what with sacking the FBI Director, hosting a Russian government photo opp in the Oval Office, as as personally inventing a business phrase that dates back to the Great Depression. But there's still time for another Executive Order, this time around cyber-security."
digital  government  and  public  services  security 
may 2017 by jonerp
Symantec’s Internet Security Threats 2017 – it’s scary down the rabbit hole
"Symantec’s 2017 Internet Security Threat Report reads more like a catalog of horrors for CIS and their staffs, with cyber spies and criminals running amuck everywhere."
data  privacy  digital  government  and  public  services  security 
may 2017 by jonerp
Time to break up Google’s monopoly? - by @dahowlett
"Google's monopoly status is coming under scrutiny. We consider the wider implications for innovation."
cloud  platforms  -  infrastructure  and  architecture  governing  identity  privacy  security  regulation 
april 2017 by jonerp
Collaboration is the key to countering IoT security concerns
"In part two of a pair of articles on what cyber-threats are likely to look like within the space of only a couple of years, experts discuss how these challenges can best be addressed, with the key watchword here being “collaboration”."
collaboration  sharing  and  digital  productivity  internet  of  things  security 
april 2017 by jonerp
Political posturing about WhatsApp is a false flag in the war on terror - by @whostu
"Something must be done about the balance between security and freedom on social platforms. What mustn't be done is sending another politician out onto the airwaves to demonstrate their technological ignorance."
digital  government  and  public  services  governing  identity  privacy  security  mobile 
march 2017 by jonerp
Technical bankruptcy – the avoidable business killer - by @dahowlett
"Technical debt is a well known concept but do readers know it can lead to technical bankruptcy? This report sets out the what, they why, and the how of getting out of this potentially dangerous situation."
cloud  erp  financials  and  supply  chain  digital  transformation  -  frictionless  enterprise  regulation  security 
march 2017 by jonerp
What Google Can Teach Us about Security
"Google has taken the interesting step of revealing exactly how its own protection works. The company has published a document, Google Infrastructure Security Design Overview, which sets out the core principles the company has adopted to keep itself secure."
analysis  news  top  stories  application  layer  security  automation  cloud  alliance  defense  in  depth  encryption  google  infrastructure  design  overview  national  institute  of  standards  and  technology 
january 2017 by jonerp
WEF 2017 – if no-one trusts big business, does size matter? - by @whostu
"There's a trust deficit around big business and the rise of populism to challenge the establishment. At Davos this week, business leaders debated whether size really matters."
digital  enterprise  in  the  real  world  governing  identity  privacy  and  security  hcm  future  of  work  social 
january 2017 by jonerp
UpGuard says companies need a web risk assessment – and that’s just for starters - by @jonerp
"in 2012, Mike Baukes left his 9-to-5 to co-found UpGuard. His aim: build tools to help companies manage risk in a complex cybersecurity world. Baukes told me how their free web site risk assessment tool works, and what he's learned about how companies should address risk in their "software supply chains."
analytics  planning  and  data  analysis  privacy  machine  intelligence  ai  security 
january 2017 by jonerp
Is security the next big cloud app? - by @denispombriant
"2016 saw many types of security problem. Is now the right time for security in the cloud as a service? Perhaps."
security 
january 2017 by jonerp
Will 2017 be the year you are pwned by Manchurian security ‘features’? - by @dahowlett
"In an internet of things world, what do you own and what can you be pwned on? This will be an important discussion in 2017."
data  privacy  internet  of  things  regulation  security 
january 2017 by jonerp
diginomica 2016 – Stuart’s choice - by @whostu
"Left till last, here's Stuart's top ten themes of 2016. Onwards to 2017 under Trump and Brexit - Happy New Year!"
cloud  erp  financials  and  supply  chain  platforms  -  infrastructure  architecture  collaboration  sharing  digital  productivity  crm  customer  experience  content  marketing  enterprise  in  the  real  world  governing  identity  privacy  security  iot  robotics  ai 
december 2016 by jonerp
US Rule 41 makes data sovereignty even more complicated for cloud buyers - by @whostu
"The US Government's amendment of Rule 41 adds further complication to an already tangled mess of data sovereignty and residency questions for cloud services buyers."
data  privacy  digital  government  and  public  services  governing  identity  security  regulation 
december 2016 by jonerp
Slush 2016 – Cyber security experts warn “we are at war every day” - by @derek_dupreez
"A panel at Europe’s largest start-up event last week discussed how the internet has created a massive attack surface that we are ill equipped to protect"
governing  identity  privacy  and  security 
december 2016 by jonerp
Securing the Olympics – lessons for enterprise cyber security
"Atos reveals what it took securing the Olympics in Rio this year against threats and attacks - useful takeaways here for enterprise cyber security"
analytics  planning  and  data  analysis  machine  intelligence  ai  security 
november 2016 by jonerp
National Cyber Security Centre Director – ‘I want less scare tactics, more data’ - by @derek_dupreez
"Dr Ian Levy, technical director of the recently announced National Cyber Security Centre, argues that cyber crime is all smoke and mirrors at the moment."
digital  government  and  public  services  security 
november 2016 by jonerp
The DevOpsification of Security
"Talk to any CISO and they’ll tell you that hiring and retaining qualified security personnel is their greatest challenge. Couple that with the fact that the average large enterprise has deployed anywhere from 50 to 70 disparate security products. The result is that understaffed teams simply cannot keep up with today’s high velocity, rapidly evolving threat landscape. The only solution becomes to replace humans with machines — to automate and orchestrate systems to understand and respond to alerts themselves"
analysis  contributed  op-ed  top  stories  analytics  and  reporting  attackiq  automation  awake  networks  cloudpassage  contrast  security  datadog  demisto 
november 2016 by jonerp
Security in the Cloud Native Era
"The container abstraction embodies three fundamental characteristics that are important to security: minimalistic (e.g., single process), declarative, and immutable. These characteristics combined make it possible to secure applications in ways that in the past were difficult or manual."
analysis  contributed  top  stories  cloud  native  applications  container  ecosystem  orchestration  security  node.js  twistlock 
november 2016 by jonerp
UK government vows to sink $2.3 billion into new cybersecurity plan
"The UK government has promised to spend nearly £2 billion over the next five years to try to tackle the growing problem of cyber attacks in the country."
ministry  of  innovation  risk  assessment  cyber  security  strategy  cyberattacks  gchq  philip  hammond  talktalk  treasury 
november 2016 by jonerp
Epilepsy care boosted by wearables and machine learning - by @jtwentyman
"MyCareCentric Epilepsy provides real-time information links between people with epilepsy and their medical teams to help them tackle this unpredictable condition together."
data  privacy  digital  enterprise  in  the  real  world  healthcare  transformation  identity  iot  robotics  and  ai  machine  intelligence  security  user  experience 
october 2016 by jonerp
A massive IoT security breach hits the web – how should enterprises respond? - by @jonerp
"A nasty IoT hack has hit the web, sparking a flurry of sensational headlines and concerns about the mainstreaming of IoT-based denial of service attacks. But how should enterprises respond? And how should IoT security be approached?"
governing  identity  privacy  and  security  internet  of  things  iot  robotics  ai 
october 2016 by jonerp
LinkedIn spoils a beautiful friendship as Salesforce hits out at ‘BFF’ Microsoft - by @whostu
"Salesforce has raised concerns with the European Commission that Microsoft's intentions for LinkedIn would be anti-competitive. It's a long way from this time last year when the two firms were BFFs!"
cloud  platforms  -  infrastructure  and  architecture  collaboration  sharing  digital  productivity  crm  customer  experience  content  marketing  governing  identity  privacy  security  retail  e-commerce  the  omni-channel 
september 2016 by jonerp
digibyte – autonomous vehicles take big human step forward with U.S. federal guidelines - by @jonerp
"Today, the U.S. federal government released its standards for autonomous vehicles. Autonomous vehicles just got a big push - here's the breakdown."
digital  government  and  public  services  governing  identity  privacy  security  regulation  robotics  automotive 
september 2016 by jonerp
Oracle OpenWorld 2016 – a short apps preview - by @dahowlett
"Oracle OpenWorld 2016 doesn't promise to be one containing blockbuster announcements. At least there's little hint of that. But we do expect to see customers talking enthusiastically about their cloud transitions."
analytics  planning  and  data  analysis  cloud  erp  financials  supply  chain  platforms  -  infrastructure  architecture  collaboration  sharing  digital  productivity  crm  customer  experience  hcm  the  future  of  work  machine  intelligence  ai  security  event  reports  oow16 
september 2016 by jonerp
Forget AWS and Google! Size matters in the cloud data center world, says Microsoft - by @jonerp
"Size matters when it comes to data centers and the cloud. Microsoft's EVP Cloud and Enterprise sets out the firm's stall against AWS and Google with some bold claims."
cloud  platforms  -  infrastructure  and  architecture  crm  customer  experience  data  privacy  devops  nosql  the  open  source  stack  digital  government  public  services  internet  of  things  security  user 
september 2016 by jonerp
Buying Apigee will test Google’s enterprise ambitions - by @philww
"Google buying Apigee, its biggest B2B software deal since Postini, is smart and shows it's serious about enterprise - but the cloud giant can still mess up."
governing  identity  privacy  and  security  infrastructure  it  service  management  mobile 
september 2016 by jonerp
Enterprise hits and misses – CSR ain’t dead, and connected cars aren’t secure - by @jonerp
"In this edition: CSR lives - digital use cases for the social good. Plus: are connected cars actually compromised cars? And: hope for the hype swamps known as data lakes, and maybe even the omni-channel. Your whiffs include What's App privacy backtracks, and a whiff that wasn't."
digital  enterprise  in  the  real  world  hits  and  misses  retail  e-commerce  omni-channel  security 
august 2016 by jonerp
Monday’s Musings: CXOs Seek Enterprise-Grade Mobile Solutions Despite Seven Barriers - by @rwang0
"Constellation’s annual survey of disruptive technologies among leading CXOs consistently places mobile enablement as a top three priority. In the 2016 survey, more than 58 percent of respondents revalidated that mobile enablement was their number one priority. Unfortunately, most CXOs and their organizations often find mobile solutions to lack the enterprise-grade capabilities required to move beyond consumerization."
2016  apps  strategy  cdo  ceo  chief  customer  officer  digital  executive  hr  information  security  marketing  people 
august 2016 by jonerp
How Frank Abagnale thinks like a con artist to improve security - by @ron_miller
"When he conducts a seminar, he often does a test where he drops some USB drives marked “confidential” in the parking lot where he’s speaking, and inevitably several people pick them up and stick them into their company laptops. They get a message that says, “This was a test and you failed.” He says he doesn’t do this to embarrass people, but to point out that one move like that could have cost the company billions of dollars."
security  tc  frank  abagnale  catch  me  if  you  can  consulting  identity  theft 
august 2016 by jonerp
Cybersecurity Costs - An Unsustainable Tax On Business - by @tomforemski
"Andy Grolnick from LogRhythm, a startup that analyzes data to spot security risks from within, said that companies cannot rely on perimeter defenses and that spotting criminal behavior relies on being able to normalize massive amounts of machine data."
a  top  story  security 
august 2016 by jonerp
Internet of Things security – six issues for enterprises to reckon with - by @jonerp
"At Liveworx 2016, Internet of Things security felt like an afterthought. Volker Gerstenberger and Tomi Ronkainen of Giesecke & Devrient are determined to change that. Here's six key issues for enterprises to think about, culled from our on-site podcast."
internet  of  things  iot  robotics  and  ai  security 
august 2016 by jonerp
Making users love Windows and other challenges for Microsoft’s Nadella - by @whostu
"Cloud services are booming and LinkedIn's about to open up new opportunities. Microsoft's Satya Nadella is on upbeat form despite some of the challenges ahead."
cloud  erp  financials  and  supply  chain  platforms  -  infrastructure  architecture  collaboration  sharing  digital  productivity  crm  customer  experience  devops  nosql  the  open  source  stack  enterprise  in  real  world  financial  services  fintech  governing  identity  privacy  security  iot  robotics  ai  ux  application  design 
july 2016 by jonerp
Irish eyes are smiling for Microsoft as Justice Dept loses data access appeal - by @whostu
"Microsoft has won the latest round of its data privacy battle with the US Justice Department, but the war isn't over yet."
governing  identity  privacy  and  security 
july 2016 by jonerp
Mike Janke of Silent Circle on enterprise security breaches and encryption absurdities - by @jonerp
"My enterprise security podcast with Mike Janke of Silent Circle vacillated between practical tips, encryption debate absurdities, and how his prior career as a Navy Seal affected his view of risk. Here's the best moments - including Janke's four enterprise security pain points."
analytics  planning  and  data  analysis  privacy  security  user  experience 
july 2016 by jonerp
Brexit and the tech sector – Keep Calm and Carry On - by @whostu
"Keep Calm and Carry On Brexit-ing - there are still opportunities and benefits ahead for the UK tech sector in a post-Brexit world, argues Tudor Aw, Technology Sector Head at KPMG."
cloud  platforms  -  infrastructure  and  architecture  digital  government  public  services  governing  identity  privacy  security  hcm  the  future  of  work 
july 2016 by jonerp
Musings - The Privacy Shield is real - what are the CxO repercussions? - by @holgermu
"The good news for enterprises is regulatory certainty - for now. It's a good time to check internal applications on compliance and have a conversation with your SaaS vendors on compliance. If an enterprises does not have data centers on both sides of the Atlantic - it's time to get them in place, or long term write off the business on the other continent."
cloud  constellation  research  data  protection  eu  holger  mueller  iaas  privacy  shield  saas  safe  harbor  security  usa 
july 2016 by jonerp
Enterprise hits and misses – automation gets extreme while Hadoop comes of age - by @jonerp
"In this edition: The perils of "extreme automation," with lessons ripped from the headlines. Also: Hadoop comes of age, with blue chip use cases at Hadoop World. Whiffs include Twitter's own CEO getting hacked, and Facebook finding that live video is a algorithmic-melting cauldron."
analytics  planning  and  data  analysis  hits  misses  security 
july 2016 by jonerp
3 ways to screw up data security in the cloud - by @davidlinthicum
"Many enterprises believe that if they have cloud security covered generally, they have data security covered specifically in the narrow. That's not true."
data  security  cloud  computing 
july 2016 by jonerp
Brexit and data governance – where to now?
As the Brexit aftershock rumbles on, Chris Middleton offers a personal view on the impact of EU withdrawal on data governance.
digital  government  and  public  services  governing  identity  privacy  security 
june 2016 by jonerp
Fear your on-premises security, not the cloud - by @davidlinthicum
"Either approach can be harmful, but on balance the bulk of the misinformation comes from the security and on-premises providers. IT organizations should be careful not to let their own fears and prejudices be abused by such tactics. Yes, verify cloud providers' claims -- doubly do so with claims from those who try to steer you away from the cloud."
cloud  security  computing  it  management 
june 2016 by jonerp
The velocity of creative destruction in the enterprise applications market
"In part one of this interview, Nutanix president Sudeesh Nair served the last rites on legacy enterprise software. In this concluding part, he expands on how this vision plays out in a world that’s not developer-centric."
cloud  platforms  -  infrastructure  and  architecture  devops  nosql  the  open  source  stack  governing  identity  privacy  security  iot  robotics  ai  new  professional  it  as  a  service  ux  application  design 
june 2016 by jonerp
Securing the Internet of Vulnerable Things
"Unsecured devices are essentially a nightmare waiting to unfold. Different countries have different laws and regulations that attempt to make sure someone can be held accountable in case of a serious security breach."
analysis  top  stories  embedded  systems  industrial  control  internet  of  things  microcontrollers  scada  security  shodan 
april 2016 by jonerp
WhatsApp’s encryption news raises the stakes for Apple vs the FBI - by @jonerp
"WhatsApp set off another encryption debate with its latest news. One prominent headline said "Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People," but it's not that simple - especially for enterprises."
data  privacy  identity  security  zoneless 
april 2016 by jonerp
Protecting identity could be key to enterprise security - by @ron_miller
"Business aside, this is ultimately about protecting the front door of our technology systems — whether on prem or in the cloud. While hackers can and do find their way into networks in other ways, stealing credentials is a simple way in and companies like Ping Identity and Okta understand this."
security  tc  identity  management  ping  okta  todd  mckinnon 
march 2016 by jonerp
« earlier      
per page:    204080120160

Copy this bookmark:





to read