Avoiding Cyber Threat Amnesia
My involvement in the non-profit educational and research organization Cyber Conflict Studies Association over the last several years has led…
From Complexity to Simplicity in the Cloud
The inner workings of cloud computing can be quite complex. That’s why the founders of Dropbox are on the right…
Passwords are the Weakest Link in Enterprise IT Security
Organizations are spending millions of dollars to beef up their data, application and network security, but still keep overlooking one…
The 4 Biggest Problems with Big Data
People are buzzing about the promise of big data. That’s because
The Unbearable Lightness of Multitenancy in the Cloud
If y’all are not in the mood to listen to a (well reasoned, researched, educated and well-timed) rant, move along. …
INSA Report: Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community
On 13 march 2012, the Intelligence and National Security Alliance (INSA) released a report culminating a years worth of interviews…
Are Public Clouds Complex Environments?
A recent analyst report suggests public clouds are prone to failure because they are inherently complex. However, just because there…
3 Ways ‘Big Data Analytics’ Will Change Enterprise Performance Management
Success of companies – big or small – will increasingly depend on their ability to capture, analyze and gain insights…
NIST definition of cloud computing doesn’t go far enough
What is cloud computing again? Dave Linthicum revisited this question, observing that many people are referencing the cloud definition established…
Top 14 Business Intelligence predictions for 2012
Don’t confuse continuity for laziness. On face value, rehashing events already transpired as ‘predictions’ may create the appearance of lethargy.…