BYON is a bigger threat to the enterprise than BYOD
Bring your own network (BYON) is "the ability of end users to create or access alternative networks when the available options are not satisfactory for their purposes." This sounds great if you're an end user or a vendor selling mobile access, but it's not so great if you're in charge of corporate security. From an enterprise perspective, BYON is seen as a derivative of the bring your own device (BYOD) movement. Since we're dealing with employee-created, unauthorized networks, however, data that travels via BYOD channels can't be monitored, which is a glaring data security risk that can introduce cyberthreats, such as malware, into a company's digital assets.
Peter Thiel talks Apple, Bitcoin, tech investing, innovation
Four Strategies For Thinking Ahead of the Curve
When I asked Filippo how he keeps his mind focused on seeing around corners, he revealed his lifelong passion for competitive chess. “It forces you to think two and three moves ahead.” All the great innovators do this. They take in more data, more inputs from the environment, from the meeting, from wherever. They live in what I call the future moment. This skillset, which I write extensively about in Winning the Innovation Game, is a safeguard to being blindsided by change. It’s fundamental to discover incredible opportunity. Below are four strategies for stepping up your game in this essential area.
Son of a Breach! Can Companies Just Safeguard Their Customers’ Data?
Sure enough, six days later, the company admitted that its payment systems were in fact breached and that the hack was going on for months. They went on to say that while credit card data was exposed, personal pins were not. Reassurance (not really). And while the exact number of affected cards wasn’t known at that time, one thing was for certain: If you used a credit card at one of Home Depot’s U.S or Canadian stores in the past 4-5 months, you needed to consider your credit card stolen and get on the phone with your bank ASAP.
Improve IT Governance with a Quick Assessment
Too often today we hear from both CIOs and clinical leaders that IT is operating in a silo and not well aligned with the emerging needs of the organization. Meaningful use and ICD-10 projects are good examples. These initiatives are often managed by IT, yet the decisions on workflow, training, content development, and management call for collaboration from clinical, business, and operational leadership. Well meaning executive teams develop cross-functional governance models, yet when it comes to decision making and participation we find too often that governance structures are largely on “paper only,” with IT making it happen.
Cloud Security's Silver Lining
With mobility on the rise, there's a trend of bypassing internal controls. This leads to a loss of visibility [for central IT]." At the core of these changes is the large growth in the SaaS market, drastically increasing the scope of the vulnerability of businesses and indicating the need to look at security as less of a "walled garden" model and more holistically. "In the future," Patel says, "the Internet edge will be cloud delivered. What's more, "although more mature CSPs have done a lot of work on security, […] that market is growing every day, and not everyone is equal."
Meet Linux kernel 3.17's best new features:
This means great new features are coming to a Linux distribution near you, though the 3.17 kernel's changes mostly consist of new and improved hardware support. New versions of the Linux kernel will eventually make their way into all sorts of other devices, too. A new Linux kernel means improvements for Chromebooks, Android devices, network routers, and any number of other embedded devices. Here's the most notable new features you'll find in the Linux 3.17 kernel.
Red Hat Storage Server 3: Not your usual software-defined storage
This new RHSS can run on your commerical off-the-shelf (COTS) x86 servers, and on OpenStack or Amazon Web Services (AWS) cloud. It's based on open source Red Hat's GlusterFS 3.6 file system and Red Hat Enterprise Linux (RHEL) 6. Red Hat claims that RHSS 3 can "easily scale to support petabytes of data and offer granular control of your storage environment while lowering the overall cost of storage."
What The United States Can Learn From Israel About Cybersecurity
In contrast to the United States, Israel’s government interacts closely with the private sector, academia, and civil society on cybersecurity issues. In fact, in 2013 Israel inaugurated an Advanced Technology Park at Ben Gurion University to serve as an international center of excellence for “cybernetics and cybersecurity.” The Technology Park brings together companies, academics, and the Israeli Defense Forces (IDF) to collaborate on projects, share research and information, and foster new thought leadership.
Shadow IT Risk and Reward
Don’t expect Shadow IT teams to conform to a single ALM governance model. Shadow IT teams follow their own process, and one has to carefully incorporate enterprise policies into Shadow IT ALM processes. Choose ALM tools that efficiently support multiple governance models. An important aspect to consider is different environment configurations and solution promotion rules. A department level Shadow IT team does not always want a development, test, and production environment. They may want to develop on their desktop/laptop, and push directly to production.
Quote for the day:
"Leadership is intangible, and therefore no weapon ever designed can replace it." -- Omar N. Bradley
Bring your own network (BYON) is "the ability of end users to create or access alternative networks when the available options are not satisfactory for their purposes." This sounds great if you're an end user or a vendor selling mobile access, but it's not so great if you're in charge of corporate security. From an enterprise perspective, BYON is seen as a derivative of the bring your own device (BYOD) movement. Since we're dealing with employee-created, unauthorized networks, however, data that travels via BYOD channels can't be monitored, which is a glaring data security risk that can introduce cyberthreats, such as malware, into a company's digital assets.
Speaking at the Gartner Symposium ITxpo, Thiel, at the conference to plug his Zero to One book, covered everything from entrepreneurial thinking to currency and investing in new technologies. Thiel covered a lot of ground ranging from education, innovation and how vertical integration is generally underestimated. There's also a big difference between globalization and technology innovation. Here's the recap on Thiel's talk.
Four Strategies For Thinking Ahead of the Curve
When I asked Filippo how he keeps his mind focused on seeing around corners, he revealed his lifelong passion for competitive chess. “It forces you to think two and three moves ahead.” All the great innovators do this. They take in more data, more inputs from the environment, from the meeting, from wherever. They live in what I call the future moment. This skillset, which I write extensively about in Winning the Innovation Game, is a safeguard to being blindsided by change. It’s fundamental to discover incredible opportunity. Below are four strategies for stepping up your game in this essential area.
Son of a Breach! Can Companies Just Safeguard Their Customers’ Data?
Sure enough, six days later, the company admitted that its payment systems were in fact breached and that the hack was going on for months. They went on to say that while credit card data was exposed, personal pins were not. Reassurance (not really). And while the exact number of affected cards wasn’t known at that time, one thing was for certain: If you used a credit card at one of Home Depot’s U.S or Canadian stores in the past 4-5 months, you needed to consider your credit card stolen and get on the phone with your bank ASAP.
Improve IT Governance with a Quick Assessment
Too often today we hear from both CIOs and clinical leaders that IT is operating in a silo and not well aligned with the emerging needs of the organization. Meaningful use and ICD-10 projects are good examples. These initiatives are often managed by IT, yet the decisions on workflow, training, content development, and management call for collaboration from clinical, business, and operational leadership. Well meaning executive teams develop cross-functional governance models, yet when it comes to decision making and participation we find too often that governance structures are largely on “paper only,” with IT making it happen.
Cloud Security's Silver Lining
With mobility on the rise, there's a trend of bypassing internal controls. This leads to a loss of visibility [for central IT]." At the core of these changes is the large growth in the SaaS market, drastically increasing the scope of the vulnerability of businesses and indicating the need to look at security as less of a "walled garden" model and more holistically. "In the future," Patel says, "the Internet edge will be cloud delivered. What's more, "although more mature CSPs have done a lot of work on security, […] that market is growing every day, and not everyone is equal."
This means great new features are coming to a Linux distribution near you, though the 3.17 kernel's changes mostly consist of new and improved hardware support. New versions of the Linux kernel will eventually make their way into all sorts of other devices, too. A new Linux kernel means improvements for Chromebooks, Android devices, network routers, and any number of other embedded devices. Here's the most notable new features you'll find in the Linux 3.17 kernel.
Red Hat Storage Server 3: Not your usual software-defined storage
This new RHSS can run on your commerical off-the-shelf (COTS) x86 servers, and on OpenStack or Amazon Web Services (AWS) cloud. It's based on open source Red Hat's GlusterFS 3.6 file system and Red Hat Enterprise Linux (RHEL) 6. Red Hat claims that RHSS 3 can "easily scale to support petabytes of data and offer granular control of your storage environment while lowering the overall cost of storage."
What The United States Can Learn From Israel About Cybersecurity
In contrast to the United States, Israel’s government interacts closely with the private sector, academia, and civil society on cybersecurity issues. In fact, in 2013 Israel inaugurated an Advanced Technology Park at Ben Gurion University to serve as an international center of excellence for “cybernetics and cybersecurity.” The Technology Park brings together companies, academics, and the Israeli Defense Forces (IDF) to collaborate on projects, share research and information, and foster new thought leadership.
Shadow IT Risk and Reward
Don’t expect Shadow IT teams to conform to a single ALM governance model. Shadow IT teams follow their own process, and one has to carefully incorporate enterprise policies into Shadow IT ALM processes. Choose ALM tools that efficiently support multiple governance models. An important aspect to consider is different environment configurations and solution promotion rules. A department level Shadow IT team does not always want a development, test, and production environment. They may want to develop on their desktop/laptop, and push directly to production.
Quote for the day:
"Leadership is intangible, and therefore no weapon ever designed can replace it." -- Omar N. Bradley
No comments:
Post a Comment