Items Tagged with "Information Technology"
Moving To The Cloud: Internal Business Considerations
July 19, 2012 Added by:Ben Kepes
Corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – in the long run organizations will not have email server administrators, desktop software support personnel or systems administrators...
Comments (0)
Beware of BYOD Wreaking Havoc
July 13, 2012 Added by:Michelle Drolet
The downside to the BYOD movement is the difficulty of maintaining security. How do IT departments provide easy access to documents and files for a host of different devices and still ensure that sensitive material remains safe and workplace systems are not exposed to serious threats? How can they safeguard networks?
Comments (1)
Department of Defense's Cloud Computing Strategy
July 12, 2012 Added by:Stefano Mele
The DOD has specific challenges that require careful adoption considerations, especially in areas of cybersecurity, continuity of operations, information assurance, and resilience. Additional challenges include service acquisition and funding, data migration and management, and overcoming network dependence...
Comments (0)
BYOD: The Reality of Allowing Foreign Bodies into Your Network
July 12, 2012 Added by:Rafal Los
We're getting compromised left and right by devices we are delusional enough to think we can trust because we feel like we've got sufficient control... Where does it end? Here, right at the point where we become cognizant of the fact that no asset, corporate or otherwise, should ever really be trusted...
Comments (0)
Cloud Surveys and Extrapolating Out to Disruption
July 11, 2012 Added by:Ben Kepes
NBVP had around 40 industry collaborators survey close to 800 respondents to ascertain their key issues impacting cloud computing. Security remains the primary inhibitor to adoption with 55% of respondents identifying it as a concern, followed by regulatory compliance at 38% and vendor lock-in at 32%...
Comments (0)
Navigating the Minefield of Mobile Technology Purchasing
July 10, 2012 Added by:Patrick Oliver Graf
In organizations, there is a constant struggle between satisfying the technological needs of workers while maintaining an adherence to compliance and security. Remote access represents the next major iteration of this battle. This complexity also means there’s far more overlap between the pain points...
Comments (0)
Leap Second, Public Cloud and a Lesson in Enterprise Resiliency
July 06, 2012 Added by:Rafal Los
Everything in life will fail at some point - it is a smart thing to plan for and architect into your applications or services. Undoubtedly this type of strategy costs more - having multiple providers, more complex software, more data shipping and redundancy isn't cheap - but this is one lesson you must learn...
Comments (0)
Hacking Strikes Fear in the Heart of Texas Bureau of Prisons
June 24, 2012 Added by:Electronic Frontier Foundation
Whether you call them hackers, makers, tinkerers, or information security researchers, people on the hacking spectrum have been a boon to society for decades. They power innovation in all sectors and operate as a valuable check on the security and stability of the technology that forms the basis for our society...
Comments (0)
The DOD's Mobility Device Strategy Released
June 20, 2012
“This strategy is not simply about embracing the newest technology - it is about keeping the DoD workforce relevant in an era when information and cyberspace play a critical role in mission success," said Teri Takai, Department of Defense chief information officer...
Comments (0)
Infosec Isn't for You If...
June 14, 2012 Added by:Ali-Reza Anghaie
Ali-Reza Anghaie - aka Packetknife - lays out a comprehensive and slightly humorous examination of why a career in information security may not be your cup of tea... How many describe you?
Comments (0)
NIST Conducts Big Data Workshop
June 14, 2012 Added by:Infosec Island Admin
In this first NIST 'Big Data' workshop, key national priority topics will be explored, including examples from science, health, disaster management, security, and finance. At the same time, topics in emerging technology areas including analytics and architectures will also be discussed...
Comments (0)
Intel Executive Joins NIST Advisory Committee
June 08, 2012 Added by:Headlines
Under Secretary of Commerce for Standards and Technology and NIST Director Patrick Gallagher has selected William M. Holt, senior vice president and general manager of Intel Corporation's Technology and Manufacturing Group, to serve on the Visiting Committee on Advanced Technology (VCAT)...
Comments (0)
The Future of Algorithms
May 17, 2012 Added by:Bill Gerneglia
Algorithms have infiltrated every application and industry on the planet. They cover standard operational control methods such as linear programming, process control and optimization, simulation, queuing, critical path analysis, project management and quality control...
Comments (0)
Behave Yourselves and Establish a Good Internet Presence
May 16, 2012 Added by:Marc Quibell
The point is that hiring managers will look you up online, and your 'Internet Presence' will be scrutinized, and even more so because these are most likely technical people and know where to look. It's time to grow up and stop being that anonymous troll...
Comments (0)
Communication is King in E-Discovery Matters
May 10, 2012 Added by:Bill Gerneglia
A common vocabulary is certainly emerging making dialog between counsel and technologists productive and effective. However, equally important is that lawyers engage their client’s technology team in dialog on e-discovery issues because when counsel fails, the fall out can be costly...
Comments (0)
NIST: Strategies to Mitigate Risk in the Federal ICT Supply Chain
May 07, 2012
Federal systems are increasingly at risk to both intentional and unintentional security risks introduced into their supply chain. The document provides a set of 10 practices intended to help federal departments and agencies manage the risk associated with the ICT supply chain...