Converging API Governance and SOA Governance
API governance is heavily influenced by IT business goals and objectives. Leading API governance platforms provide analytics supporting the assessment of IT business value. The platform should capture service tier subscription information, collects usage statistics, present productivity metrics, and integrate with billing and payment systems. API governance encompasses API subscriptions and API promotion meta-data. Governance activities managing API promotion meta-data include rationalizing keyword tags used to categorize APIs, and developer documentation content management.
A Look at Cyber Security Trends for 2014
This year, there’s been more discussion than ever about numerous topics such as the benefits of big data, the Internet of Things, mobile technology, and how to make the most of cloud computing. There’s plenty of excitement to be had so far and much more on the way, but in the fast moving technological environment we now live in, there’s also reason to worry. Security in particular, whether it’s network security, computer security, or IT security, is foremost on many business leaders’ minds. To prepare for what the future may hold, it’s important to look back at some of the recent trends to see the threats and solutions having the biggest impact on cyber security.
IoT is here and there, but not everywhere yet
isco Systems has estimated IoT will generate $14.4 trillion in economic value between last year and 2022. But Kevin Shatzkamer, a distinguished systems architect at Cisco, called IoT a misnomer, for now. “I think we’re pretty far from envisioning this as an Internet,” Shatzkamer said. “Today, what we have is lots of sets of intranets.” Within enterprises, it’s mostly individual business units deploying IoT, in a pattern that echoes the adoption of cloud computing, he said. In the past, most of the networked machines in factories, energy grids and other settings have been linked using custom-built, often local networks based on proprietary technologies.
Think like a cop: two simple questions that will protect you from cyber wolves
The secret to avoiding danger is not to rely on lists of things experts tell you to do, but to get into the habit of knowing what to ask to avoid trouble. There are two questions that the C-suite and customers should ask to minimise their risk of exposure to cyber crime but these are not being asked. Why is that? ... The diligent police detective knows their powers of arrest and restraint before they start grappling around on the floor with a villain. They know and remember this because there is a strong likelihood they will face this danger and they must do the right thing when it happens. Once ingrained in the thin blue mind, the cue card can be written.
10 Essential Elements of a Mobile Strategy
In the past few years, our thought processes have shifted in three fundamental ways. We expect to: Satisfy any impulse on a mobile device within a minute. 52% of highly mobile people are frustrated when something they want isn’t available on their smartphone; Access relevant information in any circumstance via an app or mobile search. 45 percent of users between 18 and 29 use mobile search daily; Perform a wide variety of personal and professional tasks on our mobile devices, including accessing critical documents, sharing photos, submitting expenses, performing banking tasks, managing investment portfolios etc.
NASA Mission: Cloud Governance
After the IT group realized that there were multiple root accounts, it had to design and implement a governance model for managing the accounts and apply that model to the existing network infrastructure and cloud deployment, says JPL cyber security engineer Matt Derenski. The highly automated AWS cloud system helped JPL's IT staff sort out and manage the accounts issue and then other governance and compliance requirements. Chiang notes that JPL IT staffers sometimes have difficulty tracking usage and application data on the laboratory's internal network, but the Amazon cloud offers complete visibility into the number of active accounts and which servers they're running on.
5 Must-Have Characteristics to Enable Enterprise Architecture Successfully
A lot of organizations have tried to implement Enterprise Architecture in IT, but have had a hard time gaining credibility within the organization and communicating its value effectively. Many are now turning to consultants with strong EA backgrounds to come in and help make EA successful. There are 5 characteristics that we should ascribe to in order to enable a strong Enterprise Architecture foundation for an organization: Transparency; Integrity; Selflessness; Empathy; and Effective Communication.
Information Governance: Why it’s a priority, not an option
Despite purchasing highly sophisticated data management solutions from the best of vendors, organizations’ data suffers from inconsistencies with effects as minor, but embarrassing, as wrong address or contact person name being printed on customer invoice, to as major as wrong decisions being taken by top management because of incorrect/insufficient data being available to them. In extreme cases, the organizations may fail to support regulatory compliance, or might have to re-issue their financial statements in the face of reports containing inaccurate or incomplete information being presented to relevant stakeholders.
Big Data and the Information Governance Imperative
With a smaller information footprint, organizations can more easily find what they need and derive business value from it. They must eliminate the data debris regularly and consistently, and to do this, processes and systems must be in place to cull out valuable information and discard the data debris. An IG program sets the framework to accomplish this. But a key challenge is that because of the inter-disciplinary requirements for implementing IG—no one wants to own IG. It touches on parts of the strnegths of a CIO or General Counsel, but it also requires them to go out of their confort zone into new areas.
The IT skills conundrum: too many threats and not enough professionals
With fewer skilled professionals, some organisations will simply continue to struggle to do anything beyond keeping the lights on. The smarter businesses will take action to understand their risk exposure across the business and prioritise areas to focus on. This enables them to make more informed decisions around resource requirements to help mitigate risk. But a lack of resource will often mean that there is nobody available internally to carry out the assessment in the first place. Risk and security management are important areas for any organisation and, as the threat landscape evolves, every enterprise needs to consider its current risk exposure in the context of its commercial objectives.
Quote for the day:
"Have confidence that if you have done a little thing well, you can do a bigger thing well, too." -- Joseph Storey
API governance is heavily influenced by IT business goals and objectives. Leading API governance platforms provide analytics supporting the assessment of IT business value. The platform should capture service tier subscription information, collects usage statistics, present productivity metrics, and integrate with billing and payment systems. API governance encompasses API subscriptions and API promotion meta-data. Governance activities managing API promotion meta-data include rationalizing keyword tags used to categorize APIs, and developer documentation content management.
This year, there’s been more discussion than ever about numerous topics such as the benefits of big data, the Internet of Things, mobile technology, and how to make the most of cloud computing. There’s plenty of excitement to be had so far and much more on the way, but in the fast moving technological environment we now live in, there’s also reason to worry. Security in particular, whether it’s network security, computer security, or IT security, is foremost on many business leaders’ minds. To prepare for what the future may hold, it’s important to look back at some of the recent trends to see the threats and solutions having the biggest impact on cyber security.
IoT is here and there, but not everywhere yet
isco Systems has estimated IoT will generate $14.4 trillion in economic value between last year and 2022. But Kevin Shatzkamer, a distinguished systems architect at Cisco, called IoT a misnomer, for now. “I think we’re pretty far from envisioning this as an Internet,” Shatzkamer said. “Today, what we have is lots of sets of intranets.” Within enterprises, it’s mostly individual business units deploying IoT, in a pattern that echoes the adoption of cloud computing, he said. In the past, most of the networked machines in factories, energy grids and other settings have been linked using custom-built, often local networks based on proprietary technologies.
Think like a cop: two simple questions that will protect you from cyber wolves
The secret to avoiding danger is not to rely on lists of things experts tell you to do, but to get into the habit of knowing what to ask to avoid trouble. There are two questions that the C-suite and customers should ask to minimise their risk of exposure to cyber crime but these are not being asked. Why is that? ... The diligent police detective knows their powers of arrest and restraint before they start grappling around on the floor with a villain. They know and remember this because there is a strong likelihood they will face this danger and they must do the right thing when it happens. Once ingrained in the thin blue mind, the cue card can be written.
10 Essential Elements of a Mobile Strategy
In the past few years, our thought processes have shifted in three fundamental ways. We expect to: Satisfy any impulse on a mobile device within a minute. 52% of highly mobile people are frustrated when something they want isn’t available on their smartphone; Access relevant information in any circumstance via an app or mobile search. 45 percent of users between 18 and 29 use mobile search daily; Perform a wide variety of personal and professional tasks on our mobile devices, including accessing critical documents, sharing photos, submitting expenses, performing banking tasks, managing investment portfolios etc.
NASA Mission: Cloud Governance
After the IT group realized that there were multiple root accounts, it had to design and implement a governance model for managing the accounts and apply that model to the existing network infrastructure and cloud deployment, says JPL cyber security engineer Matt Derenski. The highly automated AWS cloud system helped JPL's IT staff sort out and manage the accounts issue and then other governance and compliance requirements. Chiang notes that JPL IT staffers sometimes have difficulty tracking usage and application data on the laboratory's internal network, but the Amazon cloud offers complete visibility into the number of active accounts and which servers they're running on.
5 Must-Have Characteristics to Enable Enterprise Architecture Successfully
A lot of organizations have tried to implement Enterprise Architecture in IT, but have had a hard time gaining credibility within the organization and communicating its value effectively. Many are now turning to consultants with strong EA backgrounds to come in and help make EA successful. There are 5 characteristics that we should ascribe to in order to enable a strong Enterprise Architecture foundation for an organization: Transparency; Integrity; Selflessness; Empathy; and Effective Communication.
Information Governance: Why it’s a priority, not an option
Despite purchasing highly sophisticated data management solutions from the best of vendors, organizations’ data suffers from inconsistencies with effects as minor, but embarrassing, as wrong address or contact person name being printed on customer invoice, to as major as wrong decisions being taken by top management because of incorrect/insufficient data being available to them. In extreme cases, the organizations may fail to support regulatory compliance, or might have to re-issue their financial statements in the face of reports containing inaccurate or incomplete information being presented to relevant stakeholders.
Big Data and the Information Governance Imperative
With a smaller information footprint, organizations can more easily find what they need and derive business value from it. They must eliminate the data debris regularly and consistently, and to do this, processes and systems must be in place to cull out valuable information and discard the data debris. An IG program sets the framework to accomplish this. But a key challenge is that because of the inter-disciplinary requirements for implementing IG—no one wants to own IG. It touches on parts of the strnegths of a CIO or General Counsel, but it also requires them to go out of their confort zone into new areas.
The IT skills conundrum: too many threats and not enough professionals
With fewer skilled professionals, some organisations will simply continue to struggle to do anything beyond keeping the lights on. The smarter businesses will take action to understand their risk exposure across the business and prioritise areas to focus on. This enables them to make more informed decisions around resource requirements to help mitigate risk. But a lack of resource will often mean that there is nobody available internally to carry out the assessment in the first place. Risk and security management are important areas for any organisation and, as the threat landscape evolves, every enterprise needs to consider its current risk exposure in the context of its commercial objectives.
Quote for the day:
"Have confidence that if you have done a little thing well, you can do a bigger thing well, too." -- Joseph Storey
No comments:
Post a Comment