Welcome!


From the Blogosphere

Digital transformation has increased the speed at which organizations must adapt. As they do so, it’s more important than ever to be able to choose solutions that will give them a comprehensive, real-time view of the network. Several factors contribute to this new priority: Root cause...
Time for a blog about personal privacy, before we all have forgotten about the concept. The Circle is both the title of an 2009 album by Bon Jovi as a 2013 novel by Dave Eggers. A novel relevant for a cloud blog because it describes a future in which one company (the Circle) largely co...
Earlier this week it was reported that researchers at Boston-based security company, Rapid7, identified several security flaws in an app connected to a new toy from Mattel's Fisher-Price brand. The news of the security vulnerability caught our attention for a few reasons: The name of...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Hello Barbie™! is an IoT-enabled (Internet of Things) Barbie Doll with blonde hair, blue eyes and a built-in surveillance system. She’s not the first of her kind (and she won’t be the last), but here’s what you should know about bringing it, or any connected device, into your home. Ev...
The start of a new year is always a good time for many businesses to get their IT strategies in place. However, there has been one issue in the past couple of months that may potentially cause a lot of complications in IT departments across the US and EU; the implications for cloud com...
No seriously, I mean it. There are serious correlations and similarities between smuggling alcohol and piracy in any form, whether it’s the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it’s all free stuff while some artis...
Everyone is talking about the Cloud, whether on the news or in advertisements from top-tier tech companies, such as Microsoft, Google, and Apple. More important, the small and medium business (SMB) community has embraced the Cloud. Specifically, more than half of SMBs in the US current...
In the ESG Research Report, “2015 IT Spending Intentions Survey,” IT professionals list improving backup and recovery, managing data growth and using cloud infrastructure services as top IT priorities over the next 12 months. So it is no surprise that cloud-based disaster recovery (DR)...
As 2016 has arrived, we reflect upon one of the most debated issues around DevOps in 2015 – Information Security (InfoSec) and compliance. Needless to say, both are critical to an enterprise (especially given past examples of data breaches and looming cybersecurity threats). As a resul...
Shot this late last year for Information Security Buzz. What are five information security new year’s resolutions for improving cyber security in 2016 and why?
Imagine if Ben Grimm, aka The Thing, didn’t have such distinctive characteristics like an orange rocky body, blue eyes or his battle cry, ‘It’s Clobberin’ Time!’ and had to provide a photo ID and password to prove he was a founding member of the Fantastic Four. Or if the alien in John ...
I recently caught up with a former co-worker who now runs an information security program for a well-known retailer. While discussing new advances in cloud security and technology, he mentioned that his company had met with a provider that presented him with a mind-numbing number of de...
Everything will be on the cloud. It almost sounds like overstatement even in 2016 doesn’t it? Could we really get ourselves to the point where we regard the cloud layer as our first, primary, default and de facto location for data? The answer is: yes, we do already… although perhaps n...
You can’t seem to have a conversation about cloud technology and its impact on the business without the topic of Shadow IT coming up. The two concepts at times seem so tightly intertwined, one would think there is a certain inevitability, almost a causal linkage between them. Shadow IT...
The ability to check the status of IronPort’s health and usage is critical — and we allow you to do so from the same dashboard that also monitors the messaging servers. When IronPort fails, the entire email flow is shut down, meaning nobody in your organization can send or receive emai...
Eliminating waste is by far my favorite part of the agile approach to software. In a world where the entirety of a piece of software is designed up front, I might ship and learn only after the fact that nobody ever uses the software's WhizBang feature. That's brutal - the entire ...
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a st...
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a d...
Although corporate giants realized the danger of cyber attacks and cyber crime in general, especially after attacks on Sony and Zappos, as well as the very sensitive data breach that struck Ashley Madison website, small businesses still don't do much for making their networks more secu...
Shadow IT is here to stay. IT departments need to appreciate that it is so culturally inbuilt that shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness. The battle that can be won is to b...
The rise of cloud-based infrastructure was one of the biggest developments in IT during the past few years, and now we are seeing extensive innovations in cloud security as well. More companies are moving their business-critical data away from onsite data centers and into cloud-based i...
You’ve likely experienced alert fatigue at some point in your life. You feel exasperated as your phone pings for what seems like the hundredth time in a day, or your eyes glaze over as a glut of new analytics data rolls in. You feel resigned to the fact that an influx of email could ve...
It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the...
The recent uptick in cyber attacks across all sectors of the economy, have reinforced for CIOs the need to be able to address corporate boards and customers on their strategies for protection and resilience for the coming 2016 year. Cloud, Big Data, and the liability issues in the n...
The year 2015 is soon coming to an end as the year 2016 looks to be ushering in exciting new ways in which the Internet of Things (IoT) is changing our way of life. It’s easy to see these transformations taking shape on the consumer side (home automation, smart appliances, connected ca...
As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks. Although the use of secure processors ...
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished themselves through ingenuity, intellectual curiosity and inv...
Imagine for a moment that you have three doors in front of you containing the data your clients have backed up. Behind door number one lies a complicated clutter of data, various files, and unidentifiable information. Behind door number two you have a data desert, with little or no ava...
Naturally, new and exciting technologies and trends like software defined networking, the Internet of Things and the cloud tend to get the lion’s share of attention these days, including when it comes to security. However, it’s important to never forget that at the center of it all is ...
Based on a concept of centralized data analysts, traditional BI creates a system where IT specialists create deep-dive reports, typically for C-suite executives because analysts’ time is too valuable to spread any thinner. Imagine that you wanted to see a review of the latest weekend ...
Mobility and cloud computing have combined to obliterate any so-called network security perimeter. Corporate data has now been let loose to roam in a world of cyber thieves, manipulators and untrusted infrastructure. What is a security professional to do? According to Bill Odell, the ...
This morning on #c9d9 we spoke with two industry veterans and published authors - James DeLuccia and Jonathan McAllister - on how to bake-in security and compliance into your DevOps processes, and how DevOps and automation can essentially help you pass your next audit.
The quest to understand production and operational factors, distribute this information to business systems and people within an organization, and directly improve business processes and profitability as a result is not new. In fact, it has been embraced by companies for decades. This ...
It's a well-known adage that curiosity killed the cat, but this drive to figure things out is something that can be critical for software testers. People are often taught from an early age to question everything in order to gain a higher understanding. This characteristic is something ...
If you’re a vendor of a cybersecurity product and you’re hammering out your value proposition, you might assume that prevention is a stronger value proposition than deterrence, and mitigation is the weakest of the three. After all, mitigation presumes a successful attack, right? In ...
Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure wh...
Public safety answering point (PSAP) has relatively remained unchanged over an extended period of time. However, due to emerging technology PSAP is changing dramatically and it is becoming invaluable to many agencies that deal with public safety. The change can be directly attributed t...
Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it’s used to access a presentation at a new client meeting, to host a video conference call, or edit and email important documents, public Wi-Fi means nearly anywh...
What if you knew, through legal means, something about someone where you could intervene to deliver advice to help them perform better or stay out of danger? Should you act on that? I was recently delivering a lecture at a major university in Texas and one of the participants posed a ...