Mobile is Easier Than You Think: 3 Real-Life Lessons Learned
An overwhelming consensus of companies trying to extend their reach and increase engagement with customers, employees and staff, agree that mobile is — or will be — critical to their success as an...
View ArticleTales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)
In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general. In the blog post below –...
View ArticleYes, We Really Mean Change – Case Study in Digital Transformation
When I think of digital transformation, two quotes come to mind: “the light bulb was not invented by continuously improving the candle,” and Henry Ford’s famous statement, “if I asked people what they...
View ArticleOracle, Im sad about you, disappointed in you, and frustrated with you.
This is starting to verge on the ridiculous, and I’m not just going to take it anymore. Look, here is the reality (at least as I see it): Anyone in their right mind is building new applications in new...
View ArticleThree Reasons APAC Organizations Need to Nurture Data Scientists
I think we’re all in agreement that data science is crucial to business success. Unfortunately, as raised in my previous post, it is often passed around inside organizations like a hot potato as...
View ArticleTales from the BlackHat NOC: Learning from the right people
The week I spent in the BlackHat NOC was great exposure to both new and evolving technology and new people. As a team member of the RSA team in the BlackHat NOC I tried to approach my time there by...
View ArticlePlaying Pokemon Go? Read this.
Hands up those who would leave their front door unlocked and all their personal information like passports, identity cards, bank details, their children’s details and even passwords left out for...
View ArticleMajor Events and Hacktivism #OpOlympicHacking
Introduction As anyone who tracks attacks on the internet can tell you, Activists using hacking activity, aka “Hacktivists”, have discovered that a relatively basic hacking approach, with buy-in from...
View ArticleRe-envisioning your Information Goldmine with Artificial Intelligence
A few weeks ago, I was in Moscow with one of our customers in the financial services industry discussing their over 1,400 legacy-application decommissioning issue. They were looking for a modern and...
View ArticleFrom Factory Automation to Cloud Automation
My six-year-old son loves the show How It’s Made on the Science Channel. There are usually many episodes back-to-back on Sunday mornings, and he’ll be up at 7 a.m. or earlier ready to watch. I’ll...
View ArticleHow Cloud Foundry PaaS Enables Cloud Native
Successful companies like Ford and Netflix have deployed more than just innovative consumer service models; they also use cutting-edge cloud native IT architecture to quickly adapt to changing market...
View ArticleContext in Risk-Based Threat Patterns
Risks come from various sources that are not always possible to identify and subsequently prevent and mitigate in advance. With the growth in cloud, social, mobile and “bring your own device”...
View ArticleGlimpse #1: A Sneak Peek at the New ECD Educations Services
In a relatively short period, based on human standards of time, we have dramatically changed the way we acquire information and the methods by which we learn. There are resources like Wikipedia and...
View ArticleHyper-Converged Wars 2016-???
Warning: read the disclaimer on the blog – these are my opinions, not those of my employer. It’s getting harder for people to take my words as my own as I move into bigger and broader roles. But –...
View ArticleIt’s Not About the Pill. It’s About the Patient.
One of today’s current buzzwords is “digital transformation.” What does that really mean? Afterall, in the content management world, we’ve been digitizing paper and automating business processes for...
View ArticleThe Cloud is Creating a New Context for Security and Identity in Asia
In my last post, I discussed how hybrid cloud can help transform APAC into a digitally-driven knowledge economy. Yet away from the need for the region to build a greater proportion of income from...
View ArticleAirlines woes and GRC vacuums
I was travelling to a user meeting last week and going through Logan airport in Boston, I saw very long lines at some Delta counters. This was on Wednesday, 3 full days after the IT system outage that...
View ArticleHow do you create a Zero Day vulnerability every day?
The answer is easy, don’t correctly manage the people you let into your business! I have been working in Identity and Access Management for over 10 Years, both as the leader of the Identity Services...
View ArticleSurprise! No More Solution Customizations
Things are not always what they seem, as the earliest of Roman writers pointed out, and the same is true today in our content management-driven world. As every enterprise seeks its own digital...
View ArticleDual Perspectives on ITaaS: IT Transformation Storymap
Having a clear, well rationalized, and easy to consume IT Services portal is one of the entry points to IT Transformation. The great power given to business customers to seamlessly consume IT...
View Article