Posts Tagged 'security'

 
avatar

There are times when major trends intersect. Sometimes they reinforce each other; other times they cancel each other out. In the case of Target’s security problems, there seems to have been a fair amount of interference (to read my earlier Advisor on the Target security breach, see “Cyber Security: Inside and Out“). The FireEye software that was supposed to warn of the kind of exposure that did Target in reacted as it was supposed to: the basic problem was flagged and diagnosed immediately, and a warning message was included in one of the security logs and highlighted by analysts at Target’s Bangalore security center. Unfortunately, the critical message was not deemed worthy of immediate action by the …

Read more

Mar 142014
 
avatar

If you wear the CIO hat of a very large retail company, what could be worse than to have your site broken into and tens of millions of customers’ information records stolen and … right at the peak of the holiday season? Well, I suppose it could be worse if your organization had recently spent millions to buy the latest in security equipment and software and set up a large, 24×7 monitoring center halfway around the world to monitor the critical alerts from security software … and then when someone 12 time zones away did notice that the organization’s networks had been breached and sent a notice to their overlords in the US, nothing much …

Read more

 
Things That Go Bump in the Night

By the end of the decade, self-driving cars will be on the roads in many developed countries. The electric grid will tell our heaters when it is more economical to run, “learning thermostats” will be in many homes, and we will track the movements of people, pets, packages, and many other things. By some estimates, the number of devices connected to this “Internet of Things” (IoT) will pass the number of connected human users by 2016. The question is: will serious accidents be necessary before people take the risks seriously and harden this infrastructure? Because the IoT senses and controls physical objects, serious harm can happen — either accidentally or intentionally. We need devices to …

Read more

 
A Slowdown in IT Developments that Depend on High Performance Internet

In my prediction last year I mentioned: In 2012 practically all electronic devices will be internet based. As people progressively learn to explore and mature the use of this technology, the growing impact on business models and collaborative working models will trigger new rules of survival in the new internet-based global economy. Successful organizations will transform accordingly. I also mentioned a number of factors like “Changes in political systems, environmental concerns and issues, climate changes and natural disasters…” that would create additional pressure for the development and use of internet-based technology and software systems. The year 2012 has confirmed (without a shadow of doubt) that organizations of all types are changing their business models to …

Read more

 
Cloud-Based Collaboration Suites Take Off

Prediction: The ABS Movement Gathers Steam ABS stands for “anything but Sharepoint.” While Sharepoint 2010 added capabilities and fixed others since the 2007 version, it is still a complex, unwieldy, and costly product that often requires add-on software to be really useful. The wiki feature is still deficient, and the term store has too many holes to make it a real enterprise-wide taxonomy tool. In the meantime, a number of cloud-based, highly collaborative, easy-to-use products have emerged that can meet 80% of some users’ needs at 20% of the cost. I’m talking about products like Jive (which hopefully SAP won’t love to death if the rumors of an acquisition are true), Yammer, and IGLOO. IGLOO …

Read more

 
avatar

Some argue that a cyber-Armageddon — or a “digital Pearl Harbor” — may be just around the corner, while others counter that while cybersecurity needs to be taken seriously, the overall cyberthreat and its consequences are vastly overblown and are merely a convenient excuse to sell over-priced security software and consulting. The May 2011 Cutter IT Journal will try to separate the wheat from the chaff as pertains to security threats from current and potential cyberweapons. Proposals of interest are due 2 March 2011. To respond, please visit http://www.cutter.com/content-and-analysis/journals-and-reports/cutter-it-journal/callforpapers02.html

 
avatar

Imagine, if you will, that all owners of data centers and agents representing buyers of computing cycles get together daily and buy and sell commodity computing units (we’ll call them containers) in an open exchange. Now imagine another group of buyers and sellers who are not just exchanging those containers, but buying and selling options on the containers — the right to buy or sell those containers at a future date. This exchange would be trading the 21st-century equivalent to the pork belly. Pork bellies were introduced as a commodity in the early 1960s in the Chicago Mercantile Exchange in tradable units of 40,000 pounds. In a strange way, the world of data center virtualization …

Read more

Dec 232010
 
avatar

Here are my predictions for 2011: The transformation of smart phones into virtual wallets will stimulate new targeted attacks on mobile users. Spending on cyber surveillance technologies by governments will increase dramatically with little corresponding increase in the safety or security of citizens. Consumers who purchase 3D televisions will not need to worry about where they left their glasses because there will be very little 3D content available. [Editor's Note: This post is part of the annual "Cutter Predicts ..." series, compiled at the Cutter Consortium website.]

Dec 222010
 
Trends for 2011 and Beyond

Every year the Cutter Trends Council attempts to come up with the biggest trends for the next 12 months. Unfortunately, this is an almost-impossible task, akin to forecasting the stock market for the next 6 or 12 months. Long range trends, on the other hand, are much easier to forecast. For example, there were a number of economists and brokers who forecast the recent recession (the one we’re still in) but hardly any were able to accurately forecast that it would occur in the early Fall of 2008. What is true of forecasting economic trends is also true of Business-IT trends. It has been clear for decades that the retirement of the “baby boomers” in …

Read more

 
avatar

Here at Cutter HQ, as we fondly call it, we’re in full Summit mode: printing badges, packing boxes, tweaking the final menus – getting all the behind-the-scenes stuff done. But that’s certainly not the exciting stuff! What is exciting is the program. As always (this is the 14th Summit we’ve held here in the Boston area), there’s nothing theoretical about the program or sessions. It’s all about creating and discovering business-technology strategies that pave the way for success. And since there are no vendor sponsors, there are no pitches, subtle or otherwise, about silver bullet-type solutions. Here’s a peek at Monday’s sessions: We’re addressing cloud computing. Lou Mazzucchelli’s tackling this topic. If you’ve ever heard …

Read more