Close

Peter

IT Innovation and the bleeding edge

This is the sequel to my introductory post “IT leadership in the 21st century“. IT Innovation and the bleeding edge When IT is being used to drive innovation, it is by definition on the ‘bleeding edge’. This is because proven technology is in wide use, and it will not lead to much competitive advantage. There […]

Read More
IT leadership in the 21st century

The question I am working on is this. How can IT leaders drive the right level of cloud adoption? We know cloud computing can bring risks and benefits. But how can organizations swiftly and securely do the right level of adoption? No place for bean counters When I talk about IT leaders I don’t mean […]

Read More
Basic cloud risk assessment

You should worry about the risks of cloud computing. But don’t get too scared. With a few simple steps you can easily get a basic understanding of your risks in the cloud and even have a good start in managing these risks. If you are a large corporation in a regulated industry, a cloud risk […]

Read More
Encrypting your cloud data for extra protection

Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the only user of the […]

Read More
Look at cloud value first; only then look at risk

The most important challenge businesses encounter when it comes to adopting the cloud isn’t security. Yes, security is important; and it’s certainly true that cloud computing introduces new risks, but almost all risks can be adequately catered for. However, that doesn’t happen all the time, and that’s when expensive errors occur. Recently, I heard from […]

Read More
Simple SaaS security tips

Most people and companies are now using a significant amount of SaaS solutions. Companies are running sales support software, file sharing, collaboration, e-mail and a lot more in the cloud. But that usage also leads to concerns about the security of those solutions. How safe are they? What risks do we run? Here are a […]

Read More