May 20, 2013

Realizing Efficient Enterprise Security Intelligence
Security intelligence is built on the same concepts that have made business intelligence an essential enterprise technology. It is the critical next step for organizations that recognize the importance of information security to their business health. In this IBM® Redguide™ publication, you see how security intelligence addresses the shortcomings and empowers organizations from Fortune 500 companies, to mid-sized enterprises, to government agencies, to maintain comprehensive and cost-effective information security


Countdown clock begins for Singapore data compliance
The date all data protection compliance project teams in Singapore have been waiting for has been announced. July 2, 2014, is D-Day when Personal Data Protection Act will come into effect and when organizations will need to complete data inventory mapping, process audits, staff training, and publication of various processes.


Financial services and the public cloud: Go or no go?
“You have to overcome a lot of resistence from regulated industries before moving their stuff to the public cloud … You’ll have a hard time with your auditors in the short term if you go to public cloud,” Perretta told me recently. But, he’s keeping his eyes open because the cost savings of the public cloud are too good to ignore if these other issues can be resolved.


Linux/Cdorked.A malware: Lighttpd and nginx web servers also affected
Before going any further, one point needs to be clear about Linux/Cdorked.A. We still don’t know for sure how this malicious software was deployed on the web servers. We believe the infection vector is not unique. It cannot be attributed solely to installations of cPanel because only a fraction of the infected servers are using this management software. One thing is clear, this malware does not propagate by itself and it does not exploit a vulnerability in a specific software.


Is the Software-Defined Data Center a Good Fit for Financial Services?
The main concern with using a public cloud is that services are typically provided in multi-tenant environments. ... As a result, financial services, healthcare and insurance companies usually bypass pubic cloud solutions in favor of implementing private clouds within wholly owned or dedicated data centers. The capabilities offered by the software-defined data center (SDDC) are perfect for private clouds, and accordingly, are an appropriate fit for financial services, healthcare and insurance companies ...


How technology is changing the way we think about security
Indeed, the prelude to "destructive" attacks are disruptive attacks, which incidentally appear to be coming from nations that sponsor terror. The Distributed Denial of Service (DDoS) attacks which the financial sector has experienced in recent months are a good example of disruptive attacks ... So what can we do about it? In a recent security brief, Big Data Fuels Intelligence Driven Security (pdf), experts from RSA, Northeastern University in the US and Booz Allen Hamilton, set out the components for a big data-oriented security management system


Visibility Fabric Architecture
Sitting between the IT infrastructure and the tools that need the access to the traffic traversing the network, the Visibility Fabric architecture is comprised of the GigaVUE® family of fabric nodes and patented, advanced-level intelligence that can aggregate, filter, replicate or modify traffic to centralized management, analysis and security tools. The Visibility Fabric architecture is modular and extensible—suitable for a variety of networks of different size and scale from 1Gb connectivity to 2.4Tb chassis-based solutions.


Collaborative Approach to Smart IT
As the CIO of a large merged entity, Dohsung Yum, CIO, The Attachmate Group, had the tough task of ensuring a smooth IT integration of four businesses. As a veteran of the IT industry, Yum advises senior IT executives on how to plan IT strategy and work out an effective collaborative approach and a smart project plan in a merger scenario


Business Architecture
Business Architecture should be expressed independently of how the business architecture will be mapped to the underlying application architecture and infrastructure architecture, but is more connected to the business/contextual view of the information/data architecture and will include the organisation architecture.


What does done look like? - Project World Collectable Card #6
The reason why your project exists, is because it has to fulfil a goal, create an end result. The organization has a challenge to conquer or an opportunity to take advantage of. The goal of your project is a powerful mechanism for alignment. Everyone is working towards the same result. But first you have to make sure we all have the same understanding of what “done” looks like.



Quote for the day:

"Close scrutiny will show that most "crisis situations" are opportunities to either advance, or stay where you are." -- Maxwell Maltz

No comments:

Post a Comment