As always, a nice post, Mary. I absolutely agree that it is imperative to guard intellectual property, especially any time you're sharing storage or pipes with non-aligned companies. Two instances come to mind. The first was years ago, when the world was new, and dinosaurs roamed the Earth. A colleague was playing around with monitoring software, remotely checking our servers, and wondered whether we could do the same with a competitor's servers. Long story short, they hadn't blocked that port correctly, and (unbeknownst to management) my colleague was monitoring THEIR servers for six weeks before they noticed. Did they thank us for finding that hole in their security? They did not. Now, fast-forward a few years, and the installation of an MPLS link between Los Angeles and Dallas, Texas for a different client. When the vendor brought up the link, I was pleased to see that we could easily reach and access our Dallas assets. I was less pleased to see that we could also access assets in Rio de Janiero, Brazil, especially since our company had no such assets. After a couple hours of poking about, we finally found the offending lines in the unconfigured security device, and Rio was gone forever, but it serves as a screaming warning to anybody contemplating the use of outside vendors that they really don't have the same level of interest in assuring your security as internal assets do. If you take nothing else away from Mary's post, take the idea that any path into or out of your infrastructure is a potential attack path. I could just be paranoid, but then again, I could be absolutely right. Would you take that chance?
Now apparently the mobile platform of choice, the Apple iPhone has benefited from its sound understanding of human factors and ergonomics Ė but is this reputation threatened by a looming avalanche of advertising?
Enterprises are discovering that using social networking within the secure setting of a SaaS provider's network gives them an unusual opportunity to freely collaborate with partners, suppliers, and even competitors.
Recently, Amazon was recognized for its customer satisfaction excellence. It has made no secret that being customer-centric is a primary goal. This should be the goal of every e-tailer that wants to build market share.
Tongji University in China has teamed with local businesses in the development of a "real world" banking system that now enables students to master technical skills that are immediately transferrable to enterprises.
Enterprises would like to move to cloud computing but are hesitant because they are concerned about providersí ability to secure company data. Here are some tips that help to ensure that if breaches occur, the business is not left holding the bag.
Trying to reinvigorate their market position, suppliers added significant enhancements to their enterprise video collaboration tools, including enhanced support for mobile systems, virtualization, and cloud solutions.
All the recent hoopla about cloud security overlooks an important point, which is that it's not strictly a cloud problem. The linkage of online services into cooperative chains creates the risk, and only biometrics and federation of providers can save us.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?