Security

Photo of Pete LindstromOffline

WannaCry? Really? We don't think so.

By Pete Lindstrom

This blog brings into question the hype surrounding the recent WannaCry virus and explains why IT executives and business leaders should not be up in arms over this new threat.


Photo of Fayaz KhakiOffline

The skills shortage in information security

By Fayaz Khaki

During the McAfee FOCUS 14 event in Las Vegas I was able to spend some time the McAfee CTO for EMEA, Raj Samani. Our discussion primarily revolved around the skills shortage within the information security industry.


Photo of CEMA GroupOffline

IT managers in Poland are probably more relaxed than their international counterparts in Central and Eastern Europe. The main reason: trust. A recent IDC survey creates an informal trust index that indicates IT managers in Poland, relative to managers in other CEE countries, are less worried about staff messing up carefully configured systems or leaking data.


Photo of Fayaz KhakiOffline

Cloud migration - three phased approach

By Fayaz Khaki – 2 Comments

Given all the attention lately on Cloud, I thought I'd write a short piece on what organisations need to think of when moving to the cloud. It is reasonable to say that there are some risks involved when migrating to the cloud. Such as; a hacker only needs to compromise a single infrastructure (i.e. the cloud provider) to potentially access data from multiple organisations, conduct a denial of service that could impact an entire industry, etc.


Photo of Fayaz KhakiOffline

The value of privacy will diminish

By Fayaz Khaki

Everybody who uses a smartphone or a tablet and has downloaded apps, has exchanged personal data. The average user – which is most of us – will not know where their data is processed or even what data has been collected. The regulators are doing all that they can to tighten up the regulation but the reality is they will always be a few steps behind. There are now so many headlines of security breaches that it would appear it has numbed a users’ concept of the severity of these breaches.


Photo of Fayaz KhakiOffline

As a society we are fast approaching a world where everything is connected, our lives will potentially be logged at an infinite level. Connected fridges and cars are the just the first steps toward my shirts having sensors and notifying my tailor that my shirt has been through 50 washes at 40 degrees and has been worn 49 times in average temperatures of 12 degrees Celsius. Therefore he should start tailoring a new shirt for me now because my current shirt is going to show wear and tear in three weeks time. At which point I will come in for a new shirt.


Photo of CEMA GroupOffline

IT specialists, managers, and leaders must stop talking and start shouting at top management about IT security. Put another way, they must manage the managers to make IT security a top goal.


Photo of CEMA GroupOffline

IT security is changing visibly in response to threats arising from the latest technological developments. Organizations must cope with more complex IT environments, including the rapid growth of web-based technologies in business (e.g., cloud computing, social networks, and mobile apps), the expansion of wireless technologies, the bring-your-own-device (BYOD) trend, and increasingly sophisticated cyberattacks. In March 2014, IDC's prestigious IT Security Roadshow brought together IT professionals, independent experts, and industry leaders to discuss the latest trends and developments that help organizations across all industries to make smart strategic investments in IT security, as well as improve the effectiveness of day-to-day operation. This blog brings a view of this event and presents key messages from conference speakers for manufacturers across Central and Eastern Europe, Middle East, and Africa (CEMA).


Photo of Naveen HegdeOffline

The focus on IT security continues to be a major issue for most organizations. The findings from our latest APEJ Continuum Study 2013 confirm that spending on IT security remains strong in this era of cautious IT budget.


Photo of Paul StrassmannOffline

IDC Warned about a Snowden-Like Event

By Paul Strassmann

Surprised about Edward Snowden's leaks of classified data to the entire world? Well, it shouldn't be a surprise to everyone. Snowden's now-famous revelations follow a set of known, predictable patterns that his managers might well have recognized, if they were looking.



Viewed 546,144 times