Bob Violino

Author Archives: Bob Violino

7 steps to enhance IoT security

One of the biggest concerns with the Internet of Things (IoT) is making sure networks, data, and devices are secure. IoT-related security incidents have already occurred, and the worries among IT, security and networking managers that similar events will take place are justified.“In all but the most restrictive environments, you’re going to have IoT devices in your midst,” says Jason Taule, vice president of standards and CISO at security standards and assurance company HITRUST. "The question then isn’t if, but how you are going to allow such devices to connect to and interact with your networks, systems and data.”To read this article in full, please click here

7 steps to enhance IoT security

One of the biggest concerns with the Internet of Things (IoT) is making sure networks, data, and devices are secure. IoT-related security incidents have already occurred, and the worries among IT, security and networking managers that similar events will take place are justified.“In all but the most restrictive environments, you’re going to have IoT devices in your midst,” says Jason Taule, vice president of standards and CISO at security standards and assurance company HITRUST. "The question then isn’t if, but how you are going to allow such devices to connect to and interact with your networks, systems and data.”To read this article in full, please click here

How and where to use serverless computing

Is your organization ready to go serverless? The trend toward serverless computing is clearly on the rise, but that doesn’t mean it works ideally for every scenario or organization.Serverless computing is a software architecture model in which a cloud service provider runs the server for a customer and dynamically manages the allocation of computing resources. The term “serverless” is a misnomer, in the sense that servers are still involved in the process. Learn more about serverless computingTo read this article in full, please click here

How and where to use serverless computing

Is your organization ready to go serverless? The trend toward serverless computing is clearly on the rise, but that doesn’t mean it works ideally for every scenario or organization.Serverless computing is a software architecture model in which a cloud service provider runs the server for a customer and dynamically manages the allocation of computing resources. The term “serverless” is a misnomer, in the sense that servers are still involved in the process. Learn more about serverless computingTo read this article in full, please click here

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence has come a long way in a relatively short time, and enterprises are taking advantage of the new capabilities.Hyperconverged infrastructure (HCI) combines storage, computing and networking into a single system; hyperconverged platforms include a hypervisor for virtualized computing, software-defined storage, and virtualized networking.HCI platforms were initially aimed at virtual desktop infrastructure (VDI), video storage, and other discrete workloads with predictable resource requirements. Over time, they have advanced to become suitable platforms for enterprise applications, databases, private clouds, and edge computing deployments.To read this article in full, please click here

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence has come a long way in a relatively short time, and enterprises are taking advantage of the new capabilities.Hyperconverged infrastructure (HCI) combines storage, computing and networking into a single system; hyperconverged platforms include a hypervisor for virtualized computing, software-defined storage, and virtualized networking.HCI platforms were initially aimed at virtual desktop infrastructure (VDI), video storage, and other discrete workloads with predictable resource requirements. Over time, they have advanced to become suitable platforms for enterprise applications, databases, private clouds, and edge computing deployments.To read this article in full, please click here

IoT analytics guide: What to expect from Internet of Things data

The growth of the Internet of Things (IoT) is having a big impact on lots of areas within enterprise IT, and data analytics is one of them.Companies are gathering huge volumes of information from all kinds of connected of objects, such as data about how consumers are using certain products, the performance of corporate assets, and the environmental conditions in which systems operate. By applying advanced analytics to these incoming streams of data, organizations can gain new insights that can help them make more informed decisions about which actions to take. And with companies placing IoT sensors on more and more objects, the volumes of incoming data will continue to grow.To read this article in full, please click here

IoT: A vulnerable asset but also a recovery tool in disasters

If you think the proliferation of mobile devices changed the concept of the network edge, get ready for the emerging Internet of Things (IoT), where a network-connected sensor could be located on top of a mountain, in a corn field or even in the ocean.So, how does an enterprise incorporate IoT into its disaster recovery plan? In one sense, IoT creates a unique challenge because it is far-flung and vulnerable. But it can also become part of a DR solution, helping to protect the business in the event of a disaster, according to experts.+Also on Network World: REVIEW: 4 top disaster-recovery platforms compared; Review: Microsoft Azure IoT Suite+To read this article in full, please click here

3 real-world examples of IoT rolled out in the enterprise

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

Is your network ready for the Internet of Things?

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.Anyone in this position can expect to have to work odd hours on occasion, and needs to be constantly up to date on the latest security threats and available tools.Sometimes people who ultimately take on the role of security architect, like Jerod Brennen, could not have predicted such a career direction when they were younger. When Brennen began attending Capital University, a small liberal arts college in Ohio, in the 1990s, he intended to pursue a career in the film industry as a composer.To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to be a security consultant

IT security consultants tend to be busy people. Given the widespread shortage of professionals with skills in many different aspects of cyber security, organizations frequently need help from outside experts.Like many others who work in information security, Kevin Beaver, did not initially set out to pursue a career in the field—or to eventually become an independent IT security consultant. “During my senior year of high school, my late mother, Linda, encouraged me to go to college and study computers. That seemed to be a growing field with lots of opportunities,” Beaver says. “My mom was exactly right! My computer studies led to me pursuing this thing called computer security.”To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to be a security consultant

IT security consultants tend to be busy people. Given the widespread shortage of professionals with skills in many different aspects of cyber security, organizations frequently need help from outside experts.To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to become a chief information security officer (CISO)

download Career Tracker: What it takes to be a chief information security officer CSO Jeff Foltz did not set out to be an information security professional. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset. His degree in psychology and philosophy would also prove more useful in his CISO job than one might think.To read this article in full or to leave a comment, please click here(Insider Story)

1 2 3