Impact of Scale on Security

At InfoSec World 2018, the vast majority of roundtable discussions were about people and process, with little mention of technology. My talk was about the impact of scale on security. There were several notable conclusions that can be drawn from the conversation. I was a guide or moderator, and the conversation went to places that …

Questions for a Cloud-Based Future

Everywhere we look, cloud is the big buzzword. Digital transformation insists that we embrace cloud computing as the next evolution of our enterprise. Microsoft, Amazon, Citrix, and VMware, among many others, are all focused on cloud and mobility as the next logical step forward. Upstart companies like Netflix are the trailblazers, embracing the cloud completely …

Security: Another Key Reason for Virtualization

Aside from the production benefits of virtualization, an added benefit is improving security posture, which is paramount to most IT organizations. For those that haven’t already determined that a virtualized infrastructure is a better solution than handing out laptops with a VPN connection, there are a number of eye-opening reasons to reconsider the security impact …

Software-Defined Storage or Data Services

Software-defined storage (SDS) is about data services. Many think it is about automating storage. Yes, I can see that, but it is about what storage can deliver. So, what is the basis for SDS? There are four critical components. These components are analytics, augmentation, aggregation, and security. These four elements wrap storage to become data …

Data Sovereignty, Data Ownership

Data drives the modern business. It drives the modern development process. And it drives IT operations analytics in the NOC and the SOC. This raises the questions “Who owns all this data? Do data sovereignty rules apply?” Data is everywhere, and it is used in many ways. In many cases, the same data is used in multiple …