Security in the Cloud: Who’s Afraid of the Big Bad Wolf?

Do you know the “Three Little Pigs” fable? If not, they were three anthropomorphic pigs that, after being sent out by their mother to seek their fortune, built three different houses with different materials. A big bad wolf was able to blow down two out of three houses made of wood and straw but was unable to destroy the last house made of bricks, so he first tried to trick the pig to come out by asking to meet him at various places and then finally tried to enter the house via the chimney where he fell into a cauldron of boiling water and retreated.

Security and Users: Change is the Only Constant

Managing user accounts and access to business IT assets is challenging, particularly as cloud and social computing models introduce new wrinkles in security and identity management. Information has become “mobile” along with the users accessing it, yet management of user behavior is even more complicated that trying to manage a digital resource.

If you look at the history of security breaches, you’ll find that many of them started with a user making a mistake – like losing a laptop or clicking on a phishing email, downloading bad software, or forgetting to report an employee termination to the IT dept – something which inadvertently created a vulnerability that could be exploited. It’s tough to stop breaches because there are so many possible ways for them to happen.

BI Does Not Guarantee Better Decisions, Only Better-Informed Decisions

What does it mean when we say “faster” decision making? And why do we say “better-informed” decisions instead of “better decisions?”

Putting aside the semantic differences and nuances of meaning, these two concepts play a significant role in delivering BI solutions that can address both the urgency needed by business and the agility required by IT. Moreover, exploring these concepts–regardless of your interpretation—will further facilitate better engagements and result in tangible outcomes that can benefit the entire organization, both in the short term and in the long run.

Ten Mobile BI Strategy Questions: System Integration

More and more mobile devices are becoming connected with the software that runs on them. But the true value of mobility can’t be realized until these devices take advantage of the necessary integration among the underlying systems. The same principles hold true for mobile business intelligence (BI). Therefore, when you’re developing a mobile BI strategy, you need to capitalize on opportunities for system integration that can enhance your end product. Typically, system integration in mobile BI can be categorized into three options.

Ten Mobile BI Strategy Questions: Business Processes

When developing a mobile business intelligence (BI) strategy, you can’t ignore the role that business processes may play. In many cases, the introduction of BI content into the portfolio of mobile BI assets provides opportunities to not only eliminate the gaps in your business operations, but to improve the existing processes. Often, the impact is seen in two main ways. First, the current business processes may require you to change your mobile BI approach. Second, the mobile BI solution may highlight gaps that may require a redesign of your business processes to improve your mobile BI assets and your business operations.

IT Security and Engaging Users to Reduce Vulnerability

There is a lot of discussion going on about security in the cloud. With numerous advancements in technologies of various sorts intended to secure our information and identities on the Web, how is it that security continues to be a growing problem? The answer is in the Big Data the Web collects (read about the Internet of Things – IoT), the large silos of data now handily available in the cloud, and users who continue to provide access for all sorts of bad guys and malicious attackers simply due to not understanding that they – the users – remain as the biggest vulnerability of all. It is educating this user and finding a way to get them to recognize their potential as a critical element in enhancing system security and reducing vulnerability that has become the larger challenge.