Change Resiliency in Organizations
Resiliency builds over time by the way an organization responds to change. Avoiding change does not build resiliency; in fact, avoiding change reduces resiliency. The most resilient organizations seek out small ways to continue to improve. In this Executive Update, Sheila Q. Cox advises you on how you can build resiliency.
Building a Mobile App? Start with Design
Crafting a Secure and Effective BYOD Policy
The growth of mobile technology and devices such as smartphones has created a new phenomenon for communication and deeply changed the way businesses process data. One such phenomenon that has emerged in the business environment is "bring your own device" (BYOD), which means that employees use their personal devices to access company resources for work, inside or outside the organizational environment.
Crafting a Secure and Effective BYOD Policy
The growth of mobile technology and devices such as smartphones has created a new phenomenon for communication and deeply changed the way businesses process data. One such phenomenon that has emerged in the business environment is "bring your own device" (BYOD), which means that employees use their personal devices to access company resources for work, inside or outside the organizational environment.
Leading in the Time of Data Breaches
One day, not far into the future, we will regard this era as the time of data breaches. Data breaches will still occur occasionally, but they will be smaller and far less frequent, because those we entrust with data will have learned how to defend it from theft. In that future time, what will we be doing differently to protect our data? One thing we will be doing better is understanding how people think.
Leading in the Time of Data Breaches
One day, not far into the future, we will regard this era as the time of data breaches. Data breaches will still occur occasionally, but they will be smaller and far less frequent, because those we entrust with data will have learned how to defend it from theft. In that future time, what will we be doing differently to protect our data? One thing we will be doing better is understanding how people think.
Good Practices in Bridging the Maturity Gap
In a recent Executive Report ("Jumping the Maturity Gap: Making the Transition from Average to Excellent"), we showed how levels of EA maturity should relate to the types of initiative and the outcom
Data Hacking: No Day at the Breach — Opening Statement
— Ken Orr, Guest Editor
Leading in the Time of Data Breaches
Historically, there have been analogous eras of rampant theft. The items raided were stores of portable wealth -- art, gems, fabrics, spices, and metals.
Leading in the Time of Data Breaches
Historically, there have been analogous eras of rampant theft. The items raided were stores of portable wealth -- art, gems, fabrics, spices, and metals.
Crafting a Secure and Effective BYOD Policy
Crafting a Secure and Effective BYOD Policy
The Insider Track on Cyber Security
In June 2013, the actions of Edward Snowden set off a firestorm of revelations about the inner workings of one of the US's most secretive organizations, the National Security Agency (NSA). As the country began debating the spy versus whistleblower status of Mr. Snowden, a second, equally chilling dialogue began: how was one person, a contractor, able to walk so easily out the door of a heavily monitored facility with a treasure trove of secrets? For all organizations, it served as a sharp reminder of how much damage one insider can generate.
The Insider Track on Cyber Security
In June 2013, the actions of Edward Snowden set off a firestorm of revelations about the inner workings of one of the US's most secretive organizations, the National Security Agency (NSA). As the country began debating the spy versus whistleblower status of Mr. Snowden, a second, equally chilling dialogue began: how was one person, a contractor, able to walk so easily out the door of a heavily monitored facility with a treasure trove of secrets? For all organizations, it served as a sharp reminder of how much damage one insider can generate.
The Data Shell Game: The Best Way to Protect Corporate and Institutional Data in the Cloud
Despite the many billions of dollars in expenditures and millions of people being impacted by data breaches around the world, what we have today is a very expensive -- and seemingly unwinnable -- game of cat and mouse being played by hackers with the companies and agencies they target. And let's face it, the cats (whether they be lone individuals or, as is more common today, organized or even state-sponsored groups of professional hackers) are winning handily. Thus it's time for a paradigm shift in data security -- a new approach that will change the game entirely. It's time for the Data Shell Game. In this article, I will explain how this new form of data security works and what implementing this new way of managing and protecting data will mean for IT and for organizations as a whole.
The Data Shell Game: The Best Way to Protect Corporate and Institutional Data in the Cloud
Despite the many billions of dollars in expenditures and millions of people being impacted by data breaches around the world, what we have today is a very expensive -- and seemingly unwinnable -- game of cat and mouse being played by hackers with the companies and agencies they target. And let's face it, the cats (whether they be lone individuals or, as is more common today, organized or even state-sponsored groups of professional hackers) are winning handily. Thus it's time for a paradigm shift in data security -- a new approach that will change the game entirely. It's time for the Data Shell Game. In this article, I will explain how this new form of data security works and what implementing this new way of managing and protecting data will mean for IT and for organizations as a whole.
An Architecture Approach to Corporate Information Security
A corporate information security strategy will advance the understanding of risk management. It can bring with it a sense of security to the shareholders and corporate governance. When producing an architectural assessment, there should be a strategy that includes a management team responsible for operating procedures and a technical team to oversee the security efforts. These efforts include training, education, and implementation. Whether big or small, all organizations should have one primary individual who can direct the support, implementation, and deployment of information security.
An Architecture Approach to Corporate Information Security
A corporate information security strategy will advance the understanding of risk management. It can bring with it a sense of security to the shareholders and corporate governance. When producing an architectural assessment, there should be a strategy that includes a management team responsible for operating procedures and a technical team to oversee the security efforts. These efforts include training, education, and implementation. Whether big or small, all organizations should have one primary individual who can direct the support, implementation, and deployment of information security.
New Modes of Enterprise Transformation
Modular vs. Monolithic Enterprise Systems: What Can Be Learned From the Healthcare Industry?
The established platforms developed by other industries have laid the foundation upon which the healthcare industry has begun to propel the IT world to new heights for all industries. This foundation also yields an opportunity for the healthcare industry to create a number of new ventures, many of which may ultimately revolutionize the medical community as Facebook did for social networking.
Modular vs. Monolithic Enterprise Systems: What Can Be Learned From the Healthcare Industry?
The established platforms developed by other industries have laid the foundation upon which the healthcare industry has begun to propel the IT world to new heights for all industries. This foundation also yields an opportunity for the healthcare industry to create a number of new ventures, many of which may ultimately revolutionize the medical community as Facebook did for social networking.
Hadoop and the Connected Home
Hadoop and the Connected Home
Data Integration: The Perennial Challenge, Part I
Data integration costs consume so much of computing budgets and resources that there is little left over for taking advantage of new opportunities and proactively managing change. This Executive Update takes a frank look at where the software industry stands in addressing the integration barrier.
Data Integration: The Perennial Challenge, Part II
This Executive Update discusses how to pragmatically implement semantic metadata techniques to improve data integration.