Increased adoption of cloud services, combined with the BYOD (Bring Your Own Device) phenomenon, is causing identities and access rights to proliferate throughout the enterprise, putting ever-greater stress on organizations to go beyond perimeter defenses to secure access to sensitive information.
Stories by Thor Olavsrud
If your organization uses a multi-tenant managed hosting service or Infrastructure as a Service (IaaS) cloud for some or all of your dataÂand you aren't following best practices by encrypting that datayou may be inadvertently exposing it.
Big Data is a powerful lure, promising to turn the massive and ever-increasing volumes of data inside an organization into a pool of intelligence that promises deep, actionable insight into every aspect of a business. However, that lure can lead you into an expensive trap if you don't plan carefully.
The organizations best-prepared to face today's security threats share a fundamental profile that separates them from organizations trapped in crisis-response mode.
Few companies in the world have access to datasets as large as Google does, and, unsurprisingly, Google is one of the companies at the forefront of Big Data analytics. Now Google plans to share the wealth by giving others access to its data crunching infrastructure with its new Google BigQuery Service.
The number of security vulnerabilities declined in 2011 but malicious attacks skyrocketed 81 percent from 2010, according a new Internet Security Threat Report released by Symantec Monday. Advanced targeted attacks, in particular, were on the rise in 2011 and they are spreading to organizations of all sizes.
Enterprises are virtualizing more and more of their workloads. The benefits are well-known: consolidation and infrastructure efficiency; faster provisioning of applications and better configuration management; universal high-availability services; automated resource optimization, and dynamic scaling of applications.
When it comes to business content on mobile devices such as smartphones and tablets, fragmentation can become a serious concern: Different versions of content wind up locked in silos inside apps. This fragmentation can lead to both versioning and data loss challenges.
Even if your organization has gone the virtualization route or is leveraging the cloud, chances are you're still operating at least some of your own infrastructure. And that means there's a good chance you're operating servers and other equipment that are achieving nothing but the consumption of resources. That's right; you've got zombies in your data center.
Everyone is talking about Big Data analytics and associated business intelligence marvels these days, but before organisations will be able to leverage the data, they'll have to figure out how to store it. Managing larger data stores--at the petabyte scale and larger--is fundamentally different from managing traditional large-scale data sets. Just ask Shutterfly.
In the 25 years since Richard Stallman wrote the GNU General Public License, free and open source software (FOSS) have become pervasive in computing: Linux, Apache HTTP Server, MySQL and more can be found in large numbers of enterprises across the globe. And open source is now increasingly undergirding cloud computing as well.
Technologies like virtualization and cloud computing promise enormous leaps in efficiency and flexibility, but they can lead organizations into a quagmire if they don't plan properly for the transition, says Bill Hurley, CIO, CTO and executive vice president of Westcon Group. Without proper planning, organizations can stall in the midst of their transitions to virtualized environments or the cloud, finding themselves with a bundle of sunk costs and no path forward.
When someone utters the words Big Data (and pretty much everyone does these days), the first companies that tend to come to mind are Google and Facebook--Internet companies whose entire business is based upon voraciously devouring data. However, there are plenty of other companies out there with massive volumes of information at their fingertips, and they too are undergoing data-driven transformations.
With an eye to the threat horizon several years out, organizations can no longer afford to leave responsibility for managing security risks at the door of the information security department. Instead, organizations must adopt a much more strategic and business-based approach to risk management, says Steve Durbin, global vice president of the Information Security Forum (ISF).
Since Apache Maven, the brainchild of Sonatype founder Jason van Zyl, emerged as a top-level Apache Software Foundation project in 2003, the Central Repository has become a primary source of open source components. Jackson says the Central Repository receives four billion requests per year for its 300,000 components.