15
Nov 18

The Register – I know what you’re thinking: Outsource or in-source IT security? I’ve worked both sides, so here’s my advice…

The pros and cons of using internal and external talent, or a mix of both

You’re a small or mid-sized business and have a growing sense of unease that you aren’t doing enough on cyber security. Must be all those headlines about ransomware infections and databases ransacked. Or – perhaps – you’re experiencing an upsurge in phishing attempts.

Congratulations – you’ve woken up to something that a surprising number of companies haven’t. But now you’ve patted yourself on the back, the big question is: what’s next?

SMBs spent on average 27 per cent more on security in 2017 than the year before according to a survey last year by Cyren and Osterman Research, yet less than half felt confident they could prevent a network intrusion. Half, 52 per cent, had an IT security staff of two or fewer people.

More of The Register article from Dave Cartwright


01
Oct 18

InformationWeek – How to Drill DevOps into Your Organizational Culture

Establishing the right culture will get your DevOps initiative off on the right foot.
These days, software applications are not your classic installable Windows apps, but instead exist in the cloud, delivered on the Internet and offered as a service to end users. This has ushered in the era of modern, web-based apps that require seamless internal operations throughout development, testing and quality assurance in order to deliver an experience that satisfies (and even goes beyond) user expectation for reliability, uptime, and quality.

This paradigm shift has resulted in the rise of DevOps, and launched initiatives that reframe the way developers and engineers work on a day-to-day basis. Enterprises must innovate smarter and adapt faster to outpace competitors and scale the business. DevOps strategies not only support technological advancements that benefit the consumer, but set benchmarks for entire industries.

More of the InformationWeek article from Christian Beedgen


04
Jun 18

InfoWorld – When being cloud-native is a bad idea

Although being pushed as the end game for most cloud-based applications, there are trade-offs to consider.

It’s good to be cloud-native, or at least that’s what everyone is telling you. The idea is that you refactor (meaning partially recode) your applications to take advantage of the native features of the host cloud, such as its native APIs, storage systems, database systems, or security systems, depending on what that host cloud services offers.

The promise you’re being given is that being cloud-native will provide enhanced performance, lower operational costs for your applications, easier operations, and a bunch of other benefits as the cloud platform improves over time.

More of the InfoWorld article from David Linthicum


29
Mar 18

Continuity Central – 46 percent of organizations don’t change security strategy after a cyber attack

According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure and assets at risk.

An overwhelming number of IT security professionals believe that securing an environment starts with protecting privileged accounts: 89 percent stated that IT infrastructure and critical data are not fully protected unless privileged accounts, credentials and secrets are secured.

More of the Continuity Central post


01
Feb 18

Computerworld – Office 365: A guide to the updates

Office 365 subscribers always have the latest version of Microsoft Office — currently Office 2016. They also get more frequent software updates than those who have purchased Office 2016 without a subscription, which means subscribers have access to the latest features, security patches and bug fixes. But it can be hard to keep track of the changes in each update and know when they’re available. We’re doing for you, so you don’t have to.

Following are key updates to Office 365 for Windows since Office 2016 was released in September 2015 — all the 2017 updates and the most important ones from 2016 and late 2015, with the latest releases shown first. We’ll add info about new updates as they’re rolled out.

Note: This story covers updates released to regular Office 365 for Windows subscribers. If you’re a member of Microsoft’s Office Insider preview program or want to get a sneak peek at upcoming features, see the company’s “What’s new for Office Insiders” page.

More of the Computerworld article from Preston Gralla


31
Jan 18

Baseline – How Business Apps Drive the Digital Workplace

Business apps have emerged as essential in the digital workplace, according to a recent survey from VMware. The resulting report, “The Impact of the Digital Workforce: The New Equilibrium of the Digitally Transformed Enterprise,” indicates that these apps are significantly increasing productivity and efficiency among employees. They also serve as a great recruitment tool, as they foster an environment of optimal collaboration and decision-making that leads to inspired innovation. CIOs and other top IT managers, however, must do a better job of making the latest apps available in a “one-stop shop” manner, findings reveal. “(The) digital transformation — particularly through highly accessible employee-centric applications and productivity suites — is forcing management to adjust to a new equilibrium within the enterprise,” according to the report.

More of the Baseline slideshow from Dennis McCafferty


04
Dec 17

The Register – Seek ‘passion’ and tech skills will follow, say recruiting security chiefs

Plugging the infosec skills gap with expensive consultants or by trying to hire already skilled people won’t fix recruitment headaches, Thom Langford, CISO at Publicis Groupe, insisted at the #IRISSCERT conference in Dublin this week.

He argued that the industry should be looking for “passionate people and inspire them”, rather than people with CVs ticking the appropriate boxes.

“I’m not asking for people to take chances, rather give people opportunities” by looking beyond qualifications and experience and thinking about potential.

“We need to stop looking only for round pegs to go into round holes,” Langford said, adding that those with an IT background pick things up more quickly.

More of The Register post from John Leyden


29
Nov 17

Continuity Central – Common trends and weaknesses in crisis preparedness and business resilience

Victoria Cross, managing partner, Instinctif Partners’ Business Resilience team, discusses the top trends which have emerged from the company’s CrisisOptic and RecallOptic online diagnostic and benchmarking tools over the past year.

In the year since the CrisisOptic and RecallOptic tools have been available, we have helped over 50 businesses and organizations to quantify their business resilience. Three areas have emerged as common weaknesses in crisis preparedness and business resilience strategies and the following article looks at these in turn:

Post-incident review is a weak area

A score of 100 percent is the highest that can be achieved in each category measured, with the Review category (conducting and learning from a post-incident review) being identified as the most common area of weakness. Many of the companies obtained a low score in this area, with some even scoring zero. The average score was 50.7 per cent.

Interestingly, although overall it might be expected that larger companies would generally score more highly, size has not proved a clear indicator of preparedness. In fact, we have seen both global brands and small manufacturers scoring zero in this category.

More of the Continuity Central post


08
Nov 17

Baseline – Business Units Participate in Tech Buying Process

In today’s enterprises, line-of-business (LoB) departments are playing a bigger role in the technology buying process, especially when it concerns applications and services related to mobile and collaborative technologies. And increasingly, those two technologies are viewed as a single entity by most IT and business executives. Those findings highlight the “CDW Digital Workspace Solutions Report,” which is based on a survey of nearly 2,000 IT and non-IT executives who participate in their organization’s purchasing decisions for digital workspace solutions. This view aligns with CDW’s definition of digital workspace as the culmination of various technology silos coming together to seamlessly connect people and get work done effortlessly, anytime, anywhere and on any device. “The fact that our survey found 41 percent of digital workspace solutions are now selected by departments outside of IT shows how pervasive and integral voice, video and other collaboration technologies are becoming to organizations,” observed Nathan Coutinho, director of workspace solutions for CDW.

More of the Baseline slideshow from Eileen McCooey


07
Nov 17

ZDNet – SaaS, PaaS, and IaaS: Understand the differences

Understanding the cloud is critical to the future of business. Here’s a brief explanation of the three layers by which cloud services are delivered.

Cloud computing is one technology moving faster than almost all others toward becoming table stakes in enterprise IT. In 2017 alone, the public cloud services market is predicted to grow 18 percent, hitting a value of $246.8 billion, according to research firm Gartner.

Understanding the cloud can help business leaders make more strategic investments and remain competitive going forward. Cloud clarity starts with understanding the model itself.

As a service
According to 451 Research analyst Carl Brooks, for a technology solution to qualify as “as a Service,” it has to meet the National Institute of Standards and Technology (NIST) definition parameters, which he paraphrased as “self-service, paid on-demand, elastic, scalable, programmatically accessible (APIs), and available over the network.”

More of the ZDNet article from Conner Forest