March 15, 2015

e-Discovery Missteps From the Judge’s Point of View
The risks of ignoring e-Discovery issues in the early stages of litigation can lead to irreversible damage, such as destroying data that should have been preserved, said Joy Conti, chief judge of the Western District of Pennsylvania, who participated in the survey. Loss of data can occur if a company experiences a routine changeover in its computer systems, for example, and the hard drive holding the data is destroyed. Additionally, e-Discovery mistakes commonly occur during the preservation and collection stage, the judges warned. In particular, mistakes occur when legal teams fail to implement procedures to ensure that all relevant data is preserved and collected.

Virtualization and Security: Overcoming the Risks
First, virtualization adds additional layers of infrastructure complexity. This means monitoring for unusual events and anomalies also becomes more complex, which in turn makes it more difficult than it already is to identify security issues, such as advanced persistent threats. Next, virtualized environments are dynamic by design, rapidly changing on a regular basis. ... This is related to a phenomenon known as virtual sprawl, which refers to when the number of virtual machines in existence within an environment reaches a point where they can no longer be effectively managed, such as having all security patches properly applied. In such cases, the security of all virtual machines can no longer be guaranteed.

Rewrite 'absurdly complicated’ surveillance laws, say MPs
The first step, in a significant move towards greater transparency, is to consolidate the relevant legislation to publicly acknowledge all of the agencies’ intrusive capabilities. Where it is not practicable to specify the detail of intelligence arrangements in legislation, the MPs say the government should make it clear how these arrangements will work, for example through codes of practice. “We recognise that much of the detail regarding the agencies’ capabilities must be kept secret,” the MPs said. “There is, however, a great deal that can be discussed publicly and we believe the time has come for much greater openness and transparency regarding the agencies’ work."

5 steps to defining an effective IT strategy
A meaningful, transformative IT strategy will help businesses to understand how they can operate more effectively and efficiently, and will expose issues and bottlenecks that may be tripping them up, while articulating a vision for technology as a transformational force for the organisation. It should detail how businesses can use technology to innovate, extend their offerings and differentiate themselves from competitors, while reducing unnecessary spend, optimising processes and improving compliance. Defining an effective IT strategy can be complex. But if it’s well thought out and planned, businesses can notice massive, technology-driven changes.

How to Start With Security
Communities are only as strong as the contributions made by its members, so it’s important to give back. As you’re starting out, you may think you know very little, but even then it’s valuable to share. I blog about security and other topics at It helps to organize thoughts, which is crucial when learning. You may also gain insights from comments that readers leave. Finally, you’ll get the pleasure of knowing that there are many others out there starting with security who would benefit from seeing they are not alone. You may even already have a security community in your company. For example, EMC has a Product Security Office, which provides me with a personal security adviser and all kinds of security-related training, documentation, and tools.

Why Is Cyber-Security a Process? This Is Why.
Cyber threats are about extraction: someone taking information you have and use it for some other purpose. Usually the threat is a thief who wants to extract money and keep it. Sometimes the threat is a thief who wants to extract something of value (credit card numbers, intellectual property) and sell it, or sometimes the threat is an opponent who wants to extract information and expose it, to force you to do something you might not otherwise do, like North Korea hacking Sony emails to pressure Sony into canceling “The Interview.” In almost every case, however, the activity that happens is extraction.

What will happen if Google and Microsoft leave the mapping world?
For map software customers this sudden shift in product focus emphasizes how unreliable it is to invest in geospatial technology from companies, no matter how big, that aren’t fully committed to Geographic Information Systems (or GIS, the geek terminology for mapping applications.) GIS enables individuals and organizations to make better decisions, save money, and improve the world. Really. Understanding and optimization are key to growing an organization or to deep-dive into complex issues that have local, regional or global impacts. Place and space are fundamental to human activity and natural environments, and GIS is ideally suited to help people better explore these systems.

The Changing business through digital transformation, welcome "d!conomy"
As growing digitization and evolving consumer demand rapidly change the marketplace, executives must find new ways to innovate for business advantage. By embracing digital transformation - the use of new technologies like cloud, mobile, Big Data, and social networks - companies can capitalize on new opportunities and optimize existing operations to achieve significant business improvement. But to transform themselves, they must have the right digital assets in place first to protect their own operations from disruption. It's clear to see that technology is disruptive. This is precisely why we need to talk about digital transformation. Driven by the combination of ever-growing digitization and evolving consumer demands, digital transformation is the use of new technologies to drive significant business improvements.

IoT Startups Need To Consider Their Business Models Carefully
Many companies in traditional business make a product, sell it on shelves and, hopefully, make a profit. Whether it is Philips’ Hue or Parrot’s Flower Power, one can understand why technology companies are choosing the same retail approach used by food, drink and clothes manufacturers. After all, for many digital companies, Internet Of Things devices represent the first physical embodiment in the real world, following a generation in which online, intangible development reigned supreme. But connected devices are not cans of beans or sweaters, and device makers do not need to limit their products to a single, one-time purchase event more commonly associated by perishable items.

5 Key Components of a Successful Enterprise Architecture Function
Creating and managing a successful Enterprise Architecture function requires a variety of different hard and soft skills. In addition, each company is different and the Enterprise Architecture function needs to calibrate and align itself to the specific company.  However, there are five common features of a successful Enterprise Architecture function that are applicable to all companies.

Quote for the day:

"If you ain't the lead dog, the scenery never changes." -- Lewis Grizzard

No comments:

Post a Comment