Ask the IT Consultant:

Business Security

1

September 18, 2011  4:30 PM

Blue Skies Ahead – A New Paradigm for Cloud Security



Posted by: Beth Cohen
Business Security, Cloud architectures, cloud computing models, Cloud security, enterprise cloud services, IT security

Question: Cloud security is still a major concern for IT and Business executives.  Are there emerging security products that address the unique challenges of the cloud?

Progress has been made; business executives no longer...

September 6, 2011  4:15 PM

Patchy Clouds with a Chance of Rain



Posted by: Beth Cohen
Business Security, Cloud architectures, Cloud innovation, Cloud portfolio management, Cloud security, Security

Question: As the cloud model of IT service delivery matures, have the security standards and technologies kept up? Cloud Computing has already fundamentally changed the way consumers and small businesses use the Internet.  However, as with any new technology...


September 11, 2009  6:30 PM

Distributed Enterprise Data Risks



Posted by: Beth Cohen
Business Security, Business Value, cloud computing, Distributed systems, enterprise architectures, Supply chain

Question:  With all the talk about data on the cloud, is it possible to build a distributed enterprise architecture that addresses the issues of security and cost effective delivery without compromising business integrity? For example, let us say you are...


July 15, 2009  7:00 PM

More Clouds with a Chance of Storms



Posted by: Beth Cohen
Business Security, Business Value, cloud computing, innovation, IT Innovation, Security, technology innovation

Question:  What exactly are the top security issues that cloud vendors need to address? Somehow I am getting a sense of déjà vu on cloud security.  Don't get me wrong folks, but the cow is already out of the barn.  After all, more than 69% of all consumer...


July 7, 2009  12:00 PM

Massachusetts Privacy Laws Compliance — Part 2



Posted by: Davidatkma
Business Security, compliance, IT security, Massahusetts privacy law, Privacy protection

Question: How can my organization establish a compliance program to meet the requirements of the Massachusetts Privacy Law 01 CMR 17.00? In a previous blog post on the pending

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: