Stories by Thor Olavsrud

Cloud, BYOD increases need for automated IAM systems

Increased adoption of cloud services, combined with the BYOD (Bring Your Own Device) phenomenon, is causing identities and access rights to proliferate throughout the enterprise, putting ever-greater stress on organizations to go beyond perimeter defenses to secure access to sensitive information.

Written by Thor Olavsrud12 May 12 23:25

Is your Cloud provider exposing remnants of your data?

If your organization uses a multi-tenant managed hosting service or Infrastructure as a Service (IaaS) cloud for some or all of your data—and you aren't following best practices by encrypting that data—you may be inadvertently exposing it.

Written by Thor Olavsrud10 May 12 23:31

How to avoid Big Data spending pitfalls

Big Data is a powerful lure, promising to turn the massive and ever-increasing volumes of data inside an organization into a pool of intelligence that promises deep, actionable insight into every aspect of a business. However, that lure can lead you into an expensive trap if you don't plan carefully.

Written by Thor Olavsrud09 May 12 01:36

Successful CSOs share fundamental qualities

The organizations best-prepared to face today's security threats share a fundamental profile that separates them from organizations trapped in crisis-response mode.

Written by Thor Olavsrud04 May 12 03:02

Google's BigQuery offers infrastructure to crunch Big Data

Few companies in the world have access to datasets as large as Google does, and, unsurprisingly, Google is one of the companies at the forefront of Big Data analytics. Now Google plans to share the wealth by giving others access to its data crunching infrastructure with its new Google BigQuery Service.

Written by Thor Olavsrud02 May 12 06:55

Targeted attacks increased, became more diverse in 2011

The number of security vulnerabilities declined in 2011 but malicious attacks skyrocketed 81 percent from 2010, according a new Internet Security Threat Report released by Symantec Monday. Advanced targeted attacks, in particular, were on the rise in 2011 and they are spreading to organizations of all sizes.

Written by Thor Olavsrud01 May 12 05:56

How to virtualize mission-critical applications

Enterprises are virtualizing more and more of their workloads. The benefits are well-known: consolidation and infrastructure efficiency; faster provisioning of applications and better configuration management; universal high-availability services; automated resource optimization, and dynamic scaling of applications.

Written by Thor Olavsrud28 April 12 06:56

Combating mobile content fragmentation with Box

When it comes to business content on mobile devices such as smartphones and tablets, fragmentation can become a serious concern: Different versions of content wind up locked in silos inside apps. This fragmentation can lead to both versioning and data loss challenges.

Written by Thor Olavsrud26 April 12 03:54

Are zombies sucking the life out of your data center?

Even if your organization has gone the virtualization route or is leveraging the cloud, chances are you're still operating at least some of your own infrastructure. And that means there's a good chance you're operating servers and other equipment that are achieving nothing but the consumption of resources. That's right; you've got zombies in your data center.

Written by Thor Olavsrud20 April 12 23:19

How to implement next-generation storage infrastructure for Big Data

Everyone is talking about Big Data analytics and associated business intelligence marvels these days, but before organisations will be able to leverage the data, they'll have to figure out how to store it. Managing larger data stores--at the petabyte scale and larger--is fundamentally different from managing traditional large-scale data sets. Just ask Shutterfly.

Written by Thor Olavsrud17 April 12 09:50

Why open source is the key to Cloud innovation

In the 25 years since Richard Stallman wrote the GNU General Public License, free and open source software (FOSS) have become pervasive in computing: Linux, Apache HTTP Server, MySQL and more can be found in large numbers of enterprises across the globe. And open source is now increasingly undergirding cloud computing as well.

Written by Thor Olavsrud14 April 12 07:27

How to avoid the perils of virtualization and Cloud stall

Technologies like virtualization and cloud computing promise enormous leaps in efficiency and flexibility, but they can lead organizations into a quagmire if they don't plan properly for the transition, says Bill Hurley, CIO, CTO and executive vice president of Westcon Group. Without proper planning, organizations can stall in the midst of their transitions to virtualized environments or the cloud, finding themselves with a bundle of sunk costs and no path forward.

Written by Thor Olavsrud11 April 12 01:58

Intuit brings Big Data to small businesses and consumers

When someone utters the words Big Data (and pretty much everyone does these days), the first companies that tend to come to mind are Google and Facebook--Internet companies whose entire business is based upon voraciously devouring data. However, there are plenty of other companies out there with massive volumes of information at their fingertips, and they too are undergoing data-driven transformations.

Written by Thor Olavsrud05 April 12 04:16

IT must change security strategies to keep up with cybercriminals

With an eye to the threat horizon several years out, organizations can no longer afford to leave responsibility for managing security risks at the door of the information security department. Instead, organizations must adopt a much more strategic and business-based approach to risk management, says Steve Durbin, global vice president of the Information Security Forum (ISF).

Written by Thor Olavsrud03 April 12 06:38

Do insecure open source components threaten your apps?

Since Apache Maven, the brainchild of Sonatype founder Jason van Zyl, emerged as a top-level Apache Software Foundation project in 2003, the Central Repository has become a primary source of open source components. Jackson says the Central Repository receives four billion requests per year for its 300,000 components.

Written by Thor Olavsrud31 March 12 10:01