Security / Opinions

Everything you know about enterprise security is wrong

Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at the RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access - you have to rethink all types to security to protect data and lives.

Written by Rob Enderle28 Feb. 14 15:24

Kenneth van Wyk: After Snowden

Restoring trust in our information systems after Edward Snowden's NSA revelations will take years -- if it can be done at all.

Written by Kenneth van Wyk09 Jan. 14 13:58

2014: Time to rethink privacy

Companies have to fully confront the privacy issues they face and rethink their policies from the bottom up.

Written by Evan Schuman31 Dec. 13 11:54

Target: Deceive first, answer questions later

Issuing deceptive statements is no way to win back customers' trust. That's a lesson for anyone who might find itself in Target's position someday.

Written by Evan Schuman28 Dec. 13 16:48

Alert: Your password is probably compromised...again

Hackers have exposed millions of passwords from Facebook, Google, and Twitter. Sadly, password compromise is so common that it barely even registers as news any more. Suffice to say that it's probably time to change your password again.

Written by Tony Bradley06 Dec. 13 18:00

A CFO's take on BYOD

In a nutshell: The ever-increasing popularity of mobile devices has changed the way many enterprise users deploy technology, with an ever-increasing body of employees now bringing their own devices into work with them. The enterprise, meanwhile, focuses on ensuring its data is available securely to these devices. So, how prevalent is this trend really?
I'll skip the potential cost savings; relative to the extent of your enterprise, a move to mobile devices in replacement of PCs will indeed save a little cash, but this will quickly be eaten up by the IT departments need to make data available and secure.

Written by Jonny Evans17 Jan. 12 22:00

IT consumerisation: It's biblical!

Once upon a time, IT said unto select employees (in biblical tones): "Thou lucky employee, thou shalt have this very expensive cellphone (sign here) and thou shalt want no other. Go forth and communicate," adding, "and, lo, thou shalt also have this very expensive laptop (sign here as well) and thou better not break it, buster. Now, go forth and lug it around the country and give presentations and whatever else it is you do. Begone."

Written by Mark Gibbs06 Nov. 11 22:00

How to Maximise Your IT Security Budget

In these days of economic recession, with cyber crime on the rise, it's more important than ever for IT leaders to make the most of their security budget.

Written by CIO Staff12 Dec. 08 12:32

Heads in the cloud

Cloud computing is all about the data. The essential issues are who
owns it, who holds it and who has access to it?

Written by Damian Ward10 Nov. 08 22:00

Technology Contracts: Lawsuits Waiting to Happen

Got a technology contract to cover your latest deal, like an acquisition, merger or commercial transaction? It may not protect your interests the way you think it does. Horribly written contracts for tech and telecom deals cross my desk every day--they're a lawsuit waiting to happen. When a lawyer writes a contract, he should be writing a document that tells a story about the deal, albeit with a tilt toward his client. Often, what I see isn't a tilt--it's illiteracy.

Written by Mark Grossman30 Sept. 08 13:25

Legacy system refresh

I’ve been reading a lot recently about organisations undertaking major IT modernisation projects; ie, replacing legacy systems. Modernising a legacy environment is technologically challenging, but also culturally difficult. The changing nature of IT has and will continue to have a dramatic psychological impact on the enterprise’s greatest historical asset — its people.
Most organisations have a wide variety of applications in their portfolios. A substantial number of legacy applications were built or acquired over many years or decades. The mix is likely to include applications licensed from software vendors, along with solutions that were custom-developed by internal staff or third parties. Somewhat reflecting the various types of applications, application professionals often cluster into five dominant personas.

Written by Mary Ann Maxwell11 Aug. 08 22:00

Little safety in a very small number

We're reporting to you today from the Myers-Briggs psychobabble and associated party tricks department here at the digital life labs - a division we set up several years ago, to investigate the use of psychological profiling as a means of hacking into computers to read our personnel files.
It always seemed like a promising idea. According to the Myers-Briggs psychological profile theory, the world is populated by just 16 personality types, ranging from your shy, touchy-feely INFP (introvert, intuitive, feeling, perceptive) type, who usually ends up as a missionary or a school teacher, to your bolshie, some might say fascistic ESTJ (extrovert, sensate, thinking, judging) types, who usually end up in charge of something.

Written by John Davidson27 May 08 22:00

Grand theft identity

This so-called "telecommunications revolution" has made us all a little nervous. With the ever-present threat of "identity theft", combined with the twin threats of scam emails and the constant risk that we might accidentally be exposed to nudity whilst innocently visiting sites such as www.nudes'r'us.com, it's hard to know where one can safely turn nowadays.
Yet, despite these ongoing security threats, I've been feeling relaxed and comfortable about the telecommunications revolution lately, mainly because I recently received a revolutionary new mobile phone designed specifically to protect its owner against such threats, especially identity theft.

Written by John Davidson26 May 08 22:00

Wanted: A converged CSO

When companies decide to combine logical and physical security, one of the first challenges they face is finding a leader who has been exposed to both information security and physical security. Someone has to be put in place to create change. Who is this person? What is his skill set? Where can she be found? Does he or she actually exist?
I speak with both information security and physical security professionals every day, and when the conversation turns to who is best equipped to lead a converged security operation, I hear many opposing opinions. Usually, the opinion of the person to whom I'm speaking has a lot to do with his or her experience. Whose point of view is correct? I don't know for sure, but I can tell you about the conclusions reached by three companies that have recently contacted me for assistance in their search for a converged security leader. No opinions to share here, just facts.

Written by Jeff Snyder29 April 08 22:00