Phone Hacking Scandal Reinforces the Value of Basic Information Security
The recent phone hacking scandal, where repo
The FedCyber.com Cyber Security Summit
On 28 September 2011, FedCyber.com will present a one-day Government-Industry Cyber Security S
Using Triumfant for Secure Configuration and Change Management
It’s late Monday morning when your computer security department notices that a suspicious message has been emailed to most of…
Financial Fraud Detection & Prevention Analytics Strategies
Financial industry is facing the fiercest competition in current time after the economic meltdown. Banks are using all avenues to…
Identity and Privacy: Early Indications, June 2011
With the soft launch of Google Plus, it's an opportune time to thinkabout digital privacy, insofar as Google is explicitly…
Key Trends in Cloud Computing – Mid-2011 Update
As we round the bend half way through 2011 (the year of cloud computing), we’re seeing some interesting trends emerge…
5 Benefits of Managed Cloud Computing
In previous blogs I wrote about the benefits of private cloud computing and the benefits of public cloud computing based…
Hope is Not a Strategy: Real Data Warehouse DR planning
In my long tenure as a data warehousing provider, it is often that I will find parallels and analogies in…