Security CommunityWannaCry? Really? We don't think so.<div><p>I want Independence! A Patch Tea Party! No patchation without reprevaluation!</p> <p>Worms like Wannacry have been a problem that has existed since the ’88 Morris worm.</p> <p>While it seems like a big problem; actually, it is a fringe event (yes, even though there are some high-profile cases). Let’s be clear: Good, smart people are trying their best to make…</p></div>Pete LindstromTue, 23 May 2017 13:16:22 -0400 skills shortage in information security<div><p><span>One constantly hears the very abstract notion of there being a skills shortage within the information security industry but nobody really focuses on why this is. Given the fact that the information security domain touches on virtually every aspect of the business, the key to recruiting information security resources is in identifying those…</span></p></div>Fayaz KhakiMon, 03 Nov 2014 10:51:36 -0500 migration - three phased approach<div><p><span>However there are also benefits to moving to the cloud, such as agility in deploying products and services, infrastructure cost savings, availability of skilled resources at the cloud provider, etc. When considering a move to the cloud, organisations ought to conduct an appropriate level of due diligence and recognise the fact that migrating to…</span></p></div>Fayaz KhakiWed, 03 Sep 2014 16:17:52 -0400 value of privacy will diminish<div><p>We, the current generation of professionals still remember a time before everything could be done online - before Facebook and Twitter and Snapchat. And it is this generation that is fighting to ingrain information security and privacy in virtually everything that we do and use. This is because we know what it is like not to have our data or…</p></div>Fayaz KhakiMon, 25 Aug 2014 15:08:45 -0400 security used in consumer decision making (borrowing from the food industry)<div><p><span>Is it only a matter of time before implanting chips into humans is the norm? The level of data that can be collected from that could be astronomical. There are advantages to this also, my doctor could predict any potential illness and can help me prevent it through lifestyle change or medication. However the thought of having everything connected,…</span></p></div>Fayaz KhakiFri, 08 Aug 2014 10:12:57 -0400 Software Deployment Plans in APEJ: Survey Results<div><p>As part of our annual Continuum Survey of 1,623 end-user organizations in APEJ, we looked at buyers' investment plans for security solutions. IT security is once again rated as the most important technology investment area. As organizations intensify their adoption of advanced technologies, significant gaps in information-security programs are…</p></div>Naveen HegdeFri, 19 Jul 2013 09:22:04 -0400 Warned about a Snowden-Like Event<div><p>My January 2013 report, <em>Insider Theft Through IT Sabotage</em>, describes the perfect storm of conditions that led to Snowden's acts. Saboteurs will continue to "surprise" the management of organizations that don't consider the following.  </p> <p><strong>Who, what, when, where, how?</strong></p> <p>IT insiders commit 21% of cyber incidents, and systems administrators (like…</p></div>Paul StrassmannFri, 28 Jun 2013 13:23:52 -0400 Appliance: Asia/Pacific (excluding Japan) Forecast 2013-2017 and Market Trends<div><ul> <li>The security appliance market remains relatively positive and is expected to reach US$3,059 million in customer revenues by 2017.</li></ul> <ul> <li>We expect the growth to be strong especially in fast-growing, emerging markets like China, India, and the ASEAN.</li></ul> <ul> <li>We expect the security appliance market to enjoy healthy growth across various market segments,…</li></ul></div>Naveen HegdeThu, 20 Jun 2013 02:42:45 -0400 of Asia/Pacific (excluding Japan) IT Security Predictions for 2013<div><p>The following are the top 10 predictions for the IT security market in 2013. The document is also available on <a title="Asia/Pacific (Excluding Japan) IT Security 2013 Top 10 Predictions " href="" unsafe.mce_href=""></a></p> <p>This document was co-authored by Poon Wei Ang, Vern-Harn Hue and Pei Wang.</p> <p> <strong>1.</strong> <strong>Chief Information Officers Will Become Extinct</strong></p> <p>The adoption of social, mobile, analytics/big data, and cloud by organizations to create agility…</p></div>Naveen HegdeThu, 21 Mar 2013 08:17:04 -0400 unveiled APS 2.0 with single sign-on<div><p>The firm claims that the APS 2.0 now includes a pluggable single sign-on (SSO), service bus architecture, and customizable user interface enabling service providers to offer differentiated bundles of cloud services with an easy purchase and activation experience. This will allow Parallels service provider customers/partners access to cloud-based…</p></div>Naveen HegdeWed, 06 Mar 2013 07:47:13 -0500