Cloud Computing: Security and Privacy Still Concerns

A majority of executives polled by Deloitte (61%) believe Cloud computing will be a transformative technology in the industry and can drive financial benefits, or at least be useful for certain kinds of enterprise services. The executives were polled recently during the Deloitte webcast, “Cloud Computing in the Enterprise: Not If, But When and How?”…

The Outsourcing Continuum, Part IX: Implementation

Once you have decided to outsource your infrastructure support and have done your due diligence selecting a service provider, it is time to implement the plan. There are several steps that you will go through with your vendor to ensure that you get what you expected when you signed the outsourcing contract. 1. Establish and implement…

Understanding the Threat of Insider Misuse

Insider misuse is not necessarily malicious behavior. Individuals misusing the organization’s computing resources are for the most part not doing so with the intent to harm the organization. They may just be attempting to “get the job done.” For example, an employee may use his personal laptop to bring work home over the weekend in…

The Outsourcing Continuum, Part I

There are lots people looking at outsourcing these days as a potential cost cutter. Let me say right up front that, more often than not, outsourcing won’t save you a significant amount of money. More likely, what you will get is more value for the dollars spent. The decision to outsource some or all of…

Cyber War is Part of Real-World Conflicts Today

On August 8, 2008 Nino Doijashvili, CEO of Atlanta-based hosting company Tulip Systems was paying a visit to her home town in Tsiblinki, Georgia, thus putting her at the nexus of the first modern use of cyber attacks in conjunction with an invasion. While Russia amassed a force of 150 tanks on the border of…

Obama’s Cyber Security Czar Good Pick for IT

Editor’s Note: Ms. Hathaway has not been named to a permanent post. Placed in charge by the Obama administration of a 60-day review of the federal government’s cyber security initiatives on Feb. 9, her official title for the review period is Acting Senior Director for Cyberspace for the National Security and Homeland Security Councils. This…

Economy and IT Security Both Heading South

Tighter budgets, a greater concern over internal security breaches due to lower employee morale and complacency after a decrease in overall attacks over the past year may expose global financial institutions to an increased risk of data breaches, according to Deloitte Touche Tohmatsu’s 6th annual survey of global financial institutions’ information security efforts. “As the…

Spam, Spam, Spam & More Spam

According to security vendor PandaLabs, its analysis on 430 million email messages from 2008 revealed only 8.4% of messages that reached companies were legitimate. Some 89.88% of messages were spam, while 1.11% were infected with some type of malware. Only January 2008 witnessed levels of spam below 80%. The amount of spam fluctuated throughout the…

12 Hot IT Management Trends for 2009

In 2009, expect a strong focus on IT management initiatives that deliver measurable cost savings in a tight economy; the continued deployment of technologies that enable IT to be managed as a business; and new management challenges introduced by the growth of emerging technologies. “While there are obvious concerns surrounding the global economy, we expect…

Most Email Still Spam

PandaLabs, Panda Security’s malware analysis and detection laboratory, today announced that less than six percent of emails that reached companies in the third quarter of 2008 were legitimate correspondence. Moreover, 1.43% of emails contained malware. The data, extracted from a sample of more than 123 million emails, found the most frequently detected strains of malware…