Category: Information Security

IoT

The Internet Of Things (IoT) Has Arrived – What You Should Know

We have entered a new era of scientific breakthroughs and technological applications that will change life as we know it. Accelerated technological development is transforming our civilization. The pace of innovation is growing so rapidly that it is becoming exponential as each year passes.

Futurist Dr. Michio Kaku characterizes this blazing technological shift as moving from the “age of discovery” to the “age of mastery.”

This next decade beckons many new technological discoveries and applications. This includes genetic engineering and regeneration of body parts, new cures for diseases, artificial intelligence, augmented reality, nano-technologies, robotics, ultra-high speed trains and self-driving cars, renewable energies, sustainable agriculture, big data, 3-D Printing, digital security, quantum computing, mobility, and paper-thin flexible personal computers.

Cloud Computing

Box gives its customers ‘regions to be cheerful’

The Box World Tour rolled into London again this week, and I was there to see how the company’s enterprise march continues across Europe – and how it’s being received by the crowd in suits who came along to listen.

Some of the announcements made at the London edition of the Box World Tour can be traced back to teasers and trailers at last year’s BoxWorks. For example, KeySafe is the more marketing-friendly name for the company’s Encryption Key Management service. It now includes a software version (via AWS Key Management Service) alongside the existing AWS Hardware Service Module it launched with, making it more attractive to smaller organisations for whom a hardware appliance wasn’t a cost-effective option.

Adopting A Cooperative Global Cyber Security Framework To Mitigate Cyber Threats (Before It Is Too Late)

SecurityFeatureThe recent OPM cyber breach at the U.S. Government’s Office of Personnel Management (OPM) provided a wakeup call to the seriousness and sophistication of the cyber security threat aimed at both the public and private sectors. The fact is that over 43% of companies had breaches last year (including mega companies such as Home Depot, JPMorgan, and Target. Moreover, the intrusion threats are not diminishing. For example, British Petroleum (BP) faces 50,000 attempts at cyber intrusion every day.

Intralinks acquires Verilume to deliver on its Distributed Content Node promises

DATAFeatureWith the EU’s General Data Protection Regulation expected to come into force in 2018, and data sovereignty concerns riding high on CIO agendas, time is of the essence for SaaS vendors to prove to their customers that they have the capability and the understanding to provide services which continue to leverage cloud economics and ‘consumerised IT’ features… but do so in a more controllable and compliant fashion.

Hubble, Bubble, Tablet & Trouble

Take one laptop, add a pinch of tablet (any flavour), smart phone and wearable, and simmer gently adding liberal sprinkle of home device as required. Serve on a bed of self-regulation, et voila; Trouble is served!

And so begins the normal route to what some would call a mobile strategy. Except this isn’t anything of the sort. It isn’t a strategy but rather a hotch-potch of technologies loosely cobbled together with no concept of the complete picture, nor what is actually being achieved.

Most modern enterprises have a need for varying numbers of their staff to be mobile. Presenting to clients, travelling to different offices, working from home, working on the move, as part of a flexible working program, present in a meeting room, working in a common space in the office or taking notes at a conference. The truism that ‘work is something we do, not someplace we go’ has never been more relevant.

There are many enablers for this trend, but the main one is that we are all being asked to do more, in the same amount of time, with a broader group of people, and with the traditional millstone of ‘place’ gradually being cut free.

CIO WaterCooler