At InfoSec World 2018, the vast majority of roundtable discussions were about people and process, with little mention of technology. My talk was about the impact of scale on security. There were several notable conclusions that can be drawn from the conversation. I was a guide or moderator, and the conversation went to places that …
TVP Tag Archives
WannaCry Highlights that We’re Still Struggling to Deal with Legacy Software
There’s no need for a breathless recap of the “ransomworm” that recently spread across the globe. WannaCry was the name given to this piece of malware, and it affected hundreds of thousands of devices across more than a hundred countries.
Questions for a Cloud-Based Future
Everywhere we look, cloud is the big buzzword. Digital transformation insists that we embrace cloud computing as the next evolution of our enterprise. Microsoft, Amazon, Citrix, and VMware, among many others, are all focused on cloud and mobility as the next logical step forward. Upstart companies like Netflix are the trailblazers, embracing the cloud completely …
Security: Another Key Reason for Virtualization
Aside from the production benefits of virtualization, an added benefit is improving security posture, which is paramount to most IT organizations. For those that haven’t already determined that a virtualized infrastructure is a better solution than handing out laptops with a VPN connection, there are a number of eye-opening reasons to reconsider the security impact …
Continue reading “Security: Another Key Reason for Virtualization”
Software-Defined Storage or Data Services
Software-defined storage (SDS) is about data services. Many think it is about automating storage. Yes, I can see that, but it is about what storage can deliver. So, what is the basis for SDS? There are four critical components. These components are analytics, augmentation, aggregation, and security. These four elements wrap storage to become data …
Continue reading “Software-Defined Storage or Data Services”
Data Sovereignty, Data Ownership
Data drives the modern business. It drives the modern development process. And it drives IT operations analytics in the NOC and the SOC. This raises the questions “Who owns all this data? Do data sovereignty rules apply?” Data is everywhere, and it is used in many ways. In many cases, the same data is used in multiple …