The most recent content from our members.
As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design: To Reward, We Must Measure. How do we fix this? We start rewarding people for data protection activities. To reward people, we need to measure their deliverables. An enterprise-wide…
In my previous articles, I’ve looked at the challenges and decisions people face when undertaking digital transformation and transitioning to a hybrid cloud model of IT operation. Whether it’s using public cloud infrastructure or changing operations to leverage containers and microservices, we all know not everything can…
I really want Software Defined Networking (SDN), or something like it, to be the go-to approach for networking, but are we too tied to our idea of what SDN is for us to get there? The Definition Almost ten years ago in 2009, Kate Green coined the term Software-Defined Networking in an article describing the newly-created…
“Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is Imposter Syndrome? Impostor syndrome is a feeling of self-doubt, insecurity, or fraudulence despite often overwhelming evidence to the contrary. Imposter syndrome…
In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data when it seems everyone else wants to take the easiest…
One of the biggest draws of the public cloud includes services like managed Kubernetes or server-less functions. Managed services like these enable IT organizations to consume higher-level services, which allow the IT organization to focus their efforts on opportunities to create business value from technology.…
Patch management at any sort of scale has always been a mundane and time-consuming task that most administrators would like to avoid at all costs. With the proliferation of DevOps methodologies and the public cloud, the practice of immutable infrastructure has eliminated the need for patch management in the eyes of some,…
In my soon-to-be-released eBook, 10 Ways I Can Steal Your Data, I cover the not-so-talked-about ways that people can access your enterprise data. It covers things like you're just GIVING me your data, ways you might not realize you are giving me your data, and how to keep those things from happening. The 10 Ways eBook was…
Back in October, I wrote about Shadow IT and how some users are turning to popular file sharing applications like Dropbox, OneDrive, and Google Drive to get their work done without the friction. One point I made in that post was that “if an organization has reviewed the product, agrees to the EULA and it is approved…
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn't until I really started digging into it that a whole world of real-life examples opened up to me. In fact, if you think that your current…
It looks like you're new here. Sign in or register to get started.