Three Strategies for Fighting the Growing Issue of Insider Threats

By Chris LaPoint, VP of Product Management, SolarWinds

Altruistic hackers are slowly becoming more prominent in pop culture, specifically in TV shows in which they are young geniuses using their skills to help those in need. Their derring-do involves taking control of everything from airplanes to traffic signals, all in the name of good. And they do it with style.

A Call for Ethical IT Selling: Part Two – A Code of Engagement

Thinking back on my previous article, a thought occurred to me: Those of us in the blogosphere, and certainly those of us assisting with governmental IT missions, need to maintain a stricter code of engagement that needs to first and foremost deal with what is needed, not just wanted, from the people that we try to inform. We can do this by applying some of the basics of the journalistic code to all our communications and recommendations:

You’re Sinking My IT Ship: Why Continually Treating IT Like a Battleship is a Problem

Government IT has been characterized by long term monolithic systems that fail to deliver. Part of the problem is approaching IT as a complex durable good, like a battleship, with complete specifications, known life-cycles, and defined missions. Fighter aircraft have six generations of evolving technology and missions, each having known maintenance cycles, life spans, and changing requirements based on future planning and doctrine, as well as, mission feedback. IT has none of that because it has no duty cycle or doctrine. IT can be obsolete on delivery, regardless of development timeframe. IT delivery can redefine all previous requirements. IT has very little longevity, even if successful on delivery.

10 Areas of Concern in Cloud Security

The DLT Cloud Advisory Group is focused on the emerging cloud landscape and proactively engages with the public sector community interested in cloud computing. We also actively contribute to establish standards through our participation in various Standards Development Organizations. Along with IEEE, NIST, and the CSA, we are active contributors to the Cloud Standards Customer Council (CSCC). Most recently, we have been assisting the CSCC Security Working Group’s research efforts for their recent whitepaper, “Security for Cloud Computing: 10 Steps to Ensure Success.”