Why There Are More Than 50 Shades Of Grey In Cloud Computing Services

cloud computing services

Thought you were going to read about erotica in the cloud? Sorry to disappoint! But there are indeed 50 shades of grey and more when it comes to selecting cloud computing services. So if you are thinking about migrating to the cloud or if you want to improve your ROI in the cloud, here are the shades of “grey” you’ll need to be defining: Shades of Grey in Business Objectives – Identifying Why You Are Moving Into The Cloud There are as many business objectives for the cloud as there are shades of grey, such as capex to opex budgeting, flexibility, agility, high availability, etc. Why do you want to move to the cloud? Saying that your o … Read more

How Frederick’s Of Hollywood Used Migration To The Cloud To Spice “IT” Up

migration to the cloud

When Frederick Mellinger founded Frederick's of Hollywood in 1946, he believed that incredible lingerie could make a woman feel beautiful from the inside out. Little did he know that a legend was born. Founded in Hollywood and based there today, Frederick’s of Hollywood is a multi-channel brand with 96 stores across the U.S., as well as a digital flagship, fredericks.com. In 2011, Frederick’s of Hollywood decided to migrate to the cloud to enhance the scalability, resiliency, and flexibility of its IT infrastructure while elevating the ability to address company-wide business objectives. The company was facing a myriad of challenges: a shifting retail landscape a change in their bus … Read more

When It Comes To The Cloud And Technology, CIOs Should Understand What Got You Here, Will Get You There

the cloud and technology

Marshall Goldsmith, an executive coach to the corporate elite, is the author of the very popular book called What Got You Here Won’t Get You There. And while the title may be true as it relates to your individual career path, I have news for C-suite executives everywhere: it is not true when it comes to adopting the cloud and technology. In fact, what got you here – to your current state of success – is precisely what will get you to the next level. The problem is, as CIOs and IT professionals, we sometimes allow ourselves to be pressured into acting contrary to what we know is the right thing to do. Here’s what happens. A CEO approaches a CIO and says (in a nutshell), “What’s our cloud stra … Read more

A Movement Is Needed To Improve Cyber Security For Medical Devices

cyber security

At the 2011 Black Hat cyber security conference, a diabetic man named Jerome Radcliffe showed how someone could hack into a wireless insulin pump. Medical devices are just the latest in a growing list of Internet of Things that are at risk for potential hacks. On the surface, it may seem almost foolish to worry that some stranger will want to control a person’s insulin dosage or shut off a pacemaker or manipulate health data, but we also wondered why anyone would want to hack into cloud storage to steal compromising photos of actresses or someone would stage a major attack on an entertainment company in retaliation for a movie. If something can be hacked, it will be hacked. If for no other … Read more

9 Cyber Security Buzzwords And Jargon Definitions We Can All Understand

cyber security buzzwords

Hybrid cloud. BYOD. Big Data. Internet of Things. These are terms that have become part of the daily lexicon, not only within the information technology (IT) and cyber security world but also in the main stream. Jargon is integral to IT. They make complicated terms more accessible to the non-technical person, even if they aren’t easier to understand. Buzzwords are commonplace in IT security, as well, but are they truly understood? As Frank Ohlhorst writes in Tech Republic, “it seems that IT security managers are giving too much power to terms and buzzwords, letting them dictate security best practices.” Ohlhorst goes on to point out that while BYOD is just an acronym that means, simply, Brin … Read more

Digital Transformation Delays Stall Business Growth

digital transformation

A digital transformation is underway. It is revolutionizing the way companies conduct business through every stage of a customer interaction, as well as every business unit and associated process in an organization. This digital transformation is “the realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle,” says the Altimeter Group. This is, of course, a broad definition that encompasses an extensive swath of organizational processes. It’s about fundamentally restructuring an organization based on new and emerging technologies – especially cloud technologies. Delays to Digita … Read more

Are You Prepared To Cope With Tougher PCI Compliance Standards?

PCI compliance

On January 1, 2015, version 3.0 of the PCI (Payment Card Industry) Data Security Standards replaced version 2.0 as the standard. In other words, what some financial institutions, merchants, and other credit card payments industry members already saw as an onerous process—complying with PCI standards and possibly being audited—is about to get even harder. While I can’t take the blood, sweat and tears out of PCI compliance, as an experienced Qualified Security Assessor (QSA) I can give you some context for why PCI is issuing a new version of its standards, and why 3.0 is a good thing for your business in the end. Why PCI 3.0? So, why is PCI issuing new standards? PCI’s self-stated mission i … Read more

Cyber Security Professionals Forecast Concerns For 2015

cyber security

As the year winds down, it is fun to look forward to the year ahead and see if we can predict what may happen over the next twelve months. At the same time, predictions can prove to be very useful for businesses that are planning budgets and spending. So every December, security experts begin to make their predictions on the future of information and network security. “While no one can totally reliably predict the future, there are often good indications in what we see that provide likely directions for the coming year,” said Geoff Webb, senior director, security strategy with NetIQ. “For example, it was pretty clear at the end of last year, after the details of the Target breach become pub … Read more