As business technology managers we are constantly challenged by a need to
support a broad spectrum of information technologies within our
organizations. Now more so with the establishment of the amalgamation of
services that now comprises the cloud computing ecosystem.
The pure purpose of these technologies is to improve end-users needs as these
systems evolve. Managers are in turn constantly challenged in an effort to
present and optimize a single infrastructure to support the many different
requirements within organizations.
We are blitzed daily with newer and allegedly better means to choose,
implement, hone, improve, migrate or upgrade our technologies, via web-casts,
product pitches, conferences, email blasts etc.
Some points to consider: are some of these marketing pitches for
"change/upgrades" really necessary or inherently imperative to ensuring that
One major concern with the adoption of cloud computing is the lack of a
defined standard or standards that are specific to operations impacting
security, interoperability & mobility within the Cloud ecosystem.
As most managers of security departments will attest to, there is a fine line
between security and operations. While we as business managers want to
ensure that we maximize the ROI on our operational investments and ensure
that availability is paramount for our users, we do not want to do so at
the expense of our security measures, policies and protocols.
On the other hand... (more)
Proponents of the cloud ecosystem touts its "vastness, flexibility and
scalability as advantages for the implementation of cloud services. However,
from a digital point of view this can be a veritable forensic challenge as we
view the cloud in terms of its scope and diversity.
According to Dr. Stephen Wolthusen "Digital forensics (also referred to at
times as computer forensics) encompasses approaches and techniques for
gathering and analyzing traces of human and computer-generated activity in
such a way that it is suitable in a court of law."
A key challenge to a digital inve... (more)
As we become more technology dependent, more so in today's "cloud"-driven
environment, IT security needs to evolve from the traditional sense of
We should see the advent and acceptance of a more holistic, flexible and
adaptive model of security that focuses more on managing information
security, people and processes in a natural evolution from the traditional
model of implementation, monitoring and updating.
According to Teubner and Feller  "Governance is understood as securing a
responsible corporate management, having its roots in value-based
Last week at the 7th International Cloud Expo in Santa Clara, I sat on a
panel discussing virtualization and the cloud. As a follow on to my
contribution, it is my intention to expand on the position of virtualization
and the cloud ecosystem.
It is generally accepted that the concept of cloud computing or, at least the
amalgamation of services that infer the cloud ecosystem, lends to the premise
of improvements in managing deployed services. This due to an assumed
increase in efficiencies resulting from the sharing of hardware resources at
one end of the spectrum.
According to ... (more)