Change Resiliency in Organizations

Sheila Cox

Resiliency builds over time by the way an organization responds to change. Avoiding change does not build resiliency; in fact, avoiding change reduces resiliency. The most resilient organizations seek out small ways to continue to improve. In this Executive Update, Sheila Q. Cox advises you on how you can build resiliency.


Building a Mobile App? Start with Design

Sebastian Hassinger

Your organization has decided that it wants to build a mobile application. Congratulations! How exactly are you going to go about accomplishing that?


Crafting a Secure and Effective BYOD Policy

Anjali Kaushik

The growth of mobile technology and devices such as smartphones has created a new phenomenon for communication and deeply changed the way businesses process data. One such phenomenon that has emerged in the business environment is "bring your own device" (BYOD), which means that employees use their personal devices to access company resources for work, inside or outside the organizational environment.


Crafting a Secure and Effective BYOD Policy

Anjali Kaushik

The growth of mobile technology and devices such as smartphones has created a new phenomenon for communication and deeply changed the way businesses process data. One such phenomenon that has emerged in the business environment is "bring your own device" (BYOD), which means that employees use their personal devices to access company resources for work, inside or outside the organizational environment.


Leading in the Time of Data Breaches

Rick Brenner
 

One day, not far into the future, we will regard this era as the time of data breaches. Data breaches will still occur occasionally, but they will be smaller and far less frequent, because those we entrust with data will have learned how to defend it from theft. In that future time, what will we be doing differently to protect our data? One thing we will be doing better is understanding how people think.


Leading in the Time of Data Breaches

Rick Brenner
 

One day, not far into the future, we will regard this era as the time of data breaches. Data breaches will still occur occasionally, but they will be smaller and far less frequent, because those we entrust with data will have learned how to defend it from theft. In that future time, what will we be doing differently to protect our data? One thing we will be doing better is understanding how people think.


Good Practices in Bridging the Maturity Gap

Roger Evernden

In a recent Executive Report ("Jumping the Maturity Gap: Making the Transition from Average to Excellent"), we showed how levels of EA maturity should relate to the types of initiative and the outcom


Data Hacking: No Day at the Breach — Opening Statement

Ken Orr
"No matter how large or small our organizations are, we cannot just wash our hands of the data security problem — there is too much at stake."

— Ken Orr, Guest Editor


Leading in the Time of Data Breaches

Rick Brenner
One day, not far into the future, we will regard this era as the time of data breaches. Data breaches will still occur occasionally, but they will be smaller and far less frequent, because those we entrust with data will have learned how to defend it from theft. In that future time, what will we be doing differently to protect our data? One thing we will be doing better is understanding how people think.

Historically, there have been analogous eras of rampant theft. The items raided were stores of portable wealth -- art, gems, fabrics, spices, and metals.


Leading in the Time of Data Breaches

Rick Brenner
One day, not far into the future, we will regard this era as the time of data breaches. Data breaches will still occur occasionally, but they will be smaller and far less frequent, because those we entrust with data will have learned how to defend it from theft. In that future time, what will we be doing differently to protect our data? One thing we will be doing better is understanding how people think.

Historically, there have been analogous eras of rampant theft. The items raided were stores of portable wealth -- art, gems, fabrics, spices, and metals.


Crafting a Secure and Effective BYOD Policy

Anjali Kaushik
The growth of mobile technology and devices such as smartphones has created a new phenomenon for communication and deeply changed the way businesses process data. One such phenomenon that has emerged in the business environment is "bring your own device" (BYOD), which means that employees use their personal devices to access company resources for work, inside or outside the organizational environment.

Crafting a Secure and Effective BYOD Policy

Anjali Kaushik
The growth of mobile technology and devices such as smartphones has created a new phenomenon for communication and deeply changed the way businesses process data. One such phenomenon that has emerged in the business environment is "bring your own device" (BYOD), which means that employees use their personal devices to access company resources for work, inside or outside the organizational environment.

The Insider Track on Cyber Security

Chris Kauffman

In June 2013, the actions of Edward Snowden set off a firestorm of revelations about the inner workings of one of the US's most secretive organizations, the National Security Agency (NSA). As the country began debating the spy versus whistleblower status of Mr. Snowden, a second, equally chilling dialogue began: how was one person, a contractor, able to walk so easily out the door of a heavily monitored facility with a treasure trove of secrets? For all organizations, it served as a sharp reminder of how much damage one insider can generate.


The Insider Track on Cyber Security

Chris Kauffman

In June 2013, the actions of Edward Snowden set off a firestorm of revelations about the inner workings of one of the US's most secretive organizations, the National Security Agency (NSA). As the country began debating the spy versus whistleblower status of Mr. Snowden, a second, equally chilling dialogue began: how was one person, a contractor, able to walk so easily out the door of a heavily monitored facility with a treasure trove of secrets? For all organizations, it served as a sharp reminder of how much damage one insider can generate.


The Data Shell Game: The Best Way to Protect Corporate and Institutional Data in the Cloud

David Wyld

Despite the many billions of dollars in expenditures and millions of people being impacted by data breaches around the world, what we have today is a very expensive -- and seemingly unwinnable -- game of cat and mouse being played by hackers with the companies and agencies they target. And let's face it, the cats (whether they be lone individuals or, as is more common today, organized or even state-sponsored groups of professional hackers) are winning handily. Thus it's time for a paradigm shift in data security -- a new approach that will change the game entirely. It's time for the Data Shell Game. In this article, I will explain how this new form of data security works and what implementing this new way of managing and protecting data will mean for IT and for organizations as a whole.


The Data Shell Game: The Best Way to Protect Corporate and Institutional Data in the Cloud

David Wyld

Despite the many billions of dollars in expenditures and millions of people being impacted by data breaches around the world, what we have today is a very expensive -- and seemingly unwinnable -- game of cat and mouse being played by hackers with the companies and agencies they target. And let's face it, the cats (whether they be lone individuals or, as is more common today, organized or even state-sponsored groups of professional hackers) are winning handily. Thus it's time for a paradigm shift in data security -- a new approach that will change the game entirely. It's time for the Data Shell Game. In this article, I will explain how this new form of data security works and what implementing this new way of managing and protecting data will mean for IT and for organizations as a whole.


An Architecture Approach to Corporate Information Security

Fred Donovan

A corporate information security strategy will advance the understanding of risk management. It can bring with it a sense of security to the shareholders and corporate governance. When producing an architectural assessment, there should be a strategy that includes a management team responsible for operating procedures and a technical team to oversee the security efforts. These efforts include training, education, and implementation. Whether big or small, all organizations should have one primary individual who can direct the support, implementation, and deployment of information security.


An Architecture Approach to Corporate Information Security

Fred Donovan

A corporate information security strategy will advance the understanding of risk management. It can bring with it a sense of security to the shareholders and corporate governance. When producing an architectural assessment, there should be a strategy that includes a management team responsible for operating procedures and a technical team to oversee the security efforts. These efforts include training, education, and implementation. Whether big or small, all organizations should have one primary individual who can direct the support, implementation, and deployment of information security.


New Modes of Enterprise Transformation

Brian Dooley

Organizational change today is aided by emerging concepts of enterprise agility, as well as by a growing range of technologies that can buttress key components of a change strategy.


Modular vs. Monolithic Enterprise Systems: What Can Be Learned From the Healthcare Industry?

Renee Pratt, Donald Wynn

The established platforms developed by other industries have laid the foundation upon which the healthcare industry has begun to propel the IT world to new heights for all industries. This foundation also yields an opportunity for the healthcare industry to create a number of new ventures, many of which may ultimately revolutionize the medical community as Facebook did for social networking.


Modular vs. Monolithic Enterprise Systems: What Can Be Learned From the Healthcare Industry?

Renee Pratt, Donald Wynn

The established platforms developed by other industries have laid the foundation upon which the healthcare industry has begun to propel the IT world to new heights for all industries. This foundation also yields an opportunity for the healthcare industry to create a number of new ventures, many of which may ultimately revolutionize the medical community as Facebook did for social networking.


Hadoop and the Connected Home

Curt Hall

The real value of the Internet of Things (IoT) is not achieved by connecting individual sensor-enabled devices separately to the Internet or mobile network.


Hadoop and the Connected Home

Curt Hall

The real value of the Internet of Things (IoT) is not achieved by connecting individual sensor-enabled devices separately to the Internet or mobile network.


Data Integration: The Perennial Challenge, Part I

David Frankel

Data integration costs consume so much of computing budgets and resources that there is little left over for taking advantage of new opportunities and proactively managing change. This Executive Update takes a frank look at where the software industry stands in addressing the integration barrier.


Data Integration: The Perennial Challenge, Part II

David Frankel

This Executive Update discusses how to pragmatically implement semantic metadata techniques to improve data integration.