There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud ComputingArtificial IntelligenceMobilityBig DataRoboticsInternet of ThingsCyberSecurity.
hacking-detected-shutterstock_188832089
Cyber Security is far more than just protecting data. Security is about protecting the functionality of IT. It involves confidentiality, availability and integrity of resources. This higher order approach to cyber security requires vision, leadership, and actions in dimensions of people, process and technology.

 

 

Women in Cybersecurity: Reducing the Gender Gap Part III

This is the third post in a three part blog post on the Women in Cybersecurity Conference that took place March 31st through April 2nd in Dallas, Texas. The first keynote for the final day of the Women in Cybersecurity conference was Shelley Westman. Westman had a long road that ultimately led her to where she is today, […]

Black Mirror Transcends Fiction Into Reality

Fiction, especially fiction with technology components, can be an entertaining way to think through ethics issues. With that in mind a series we have been watching is the Netflix anthology called Black Mirror. Black Mirror highlights the dark side of life and technology, is now a reality. In the third episode of Season 1, “The Entire History […]

Empowering Cloud Utilization in the Federal Market

Bright Computing has just released a white paper on “Empowering Cloud Utilization in the Federal Market.” This white paper addresses: Cloud adoption among government and defense agencies lags behind uptake in the enterprise. In the U.S. for example, despite a federal “Cloud First” mandate, government organizations are proceeding to the cloud cautiously. Cloud bursting provides an attractive, low-risk […]

The Best Practices are No Longer the “Best” Practices

Editors note: This is a sponsored post provided by Cray. There was a time when information systems security was much simpler. It focused on the appropriate time frame to take a sample of a one-dimensional system log that tracked events like blocked traffic, virus detection, and machines taken off-line. In this day and age, breaches, […]

Women in Cybersecurity: Reducing the Gender Gap Part II

This is the second post in a three part blog post on the Women in Cybersecurity Conference that took place March 31st through April 2nd in Dallas, Texas. “With 1.5M job openings in cybersecurity, we need security professionals with diverse skill sets” – Jillian Munro Jillian Munro was the first keynote at the WiCyS  conference. […]

The Need for a Framework for Resilient Cybersecurity

There is little doubt that today our society and enterprises are more connected than ever before. The reality of internet accessible critical infrastructure, Cloud Computing, Bring Your Own Device (BYOD), mobile and Internet of Things (IoT) has stretched the capabilities of todays cyber defenses. Moreover, the expansion of enterprise architectures to include these enabling technologies has […]