Optimizing ISO/IEC 27001 Using O-ISM3

Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS). Continue reading →

Challenges to Building a Global Identity Ecosystem

In this fifth video – Building a Global Identity Ecosystem – we highlight what we need to change and develop to build a viable identity ecosystem. The Internet is global, so any identity ecosystem similarly must be capable of being adopted and implemen…

Video Highlights Day 2 of Washington, D.C.

How can you use the tools of Enterprise Architecture and open standards to improve the capability of your company doing business? The Day 2 speakers of The Open Group Conference in Washington, D.C. addressed this question, focusing on Enterprise Transf…

Summer in the Capitol – Looking Back at The Open Group Conference in Washington, D.C.

Jim Hietala, VP of security at The Open Group, provides a summary of The Open Group conference in Washington, D.C. (July 16-18). Continue reading →

The Open Group Trusted Technology Forum is Leading the Way to Securing Global IT Supply Chains

An Open Group podcast examining the advancement of The Open Group Trusted Technology Forum (OTTF) to gain an update on the effort’s achievements, and to learn more about how technology suppliers and buyers can expect to benefit in advance of The Open G…

Cybersecurity Threats Key Theme at Washington, D.C. Conference – July 16-20, 2012

A preview of the upcoming Open Group Conference in Washington, D.C. – July 16-20, 2012. More information can be found here: http://www3.opengroup.org/dc2012 Continue reading →

Cloud Computing and Security: Do You Know Where Your Data Is?

Migrating more data and applications to the cloud is top of CIO’s to-do list right now. 52% of the 489 business and technology executives who responded to our 2012 Digital IQ study plan to boost their spending in the private cloud this year. Those same firms are simultaneously setting their sights on the public cloud. 57% of the leadership surveyed claim they are ramping up their investments in public clouds. Understandably, security is weighing heavy […]

If you liked this, you might also like:

  1. The Era of Security Breaches
  2. Why Cloud Computing Has Legs
  3. CIO Guide to Cloud Computing

Open Group Security Gurus Dissect the Cloud: Higher of Lower Risk

By Dana Gardner, Interarbor Solutions For some, any move to the Cloud — at least the public Cloud — means a higher risk for security. For others, relying more on a public Cloud provider means better security. There’s more of a concentrated a…

Security and Cloud Computing Themes to be explored at The Open Group San Francisco Conference

By The Open Group Conference Team Cybersecurity and Cloud Computing are two of the most pressing trends facing enterprises today. The Open Group Conference San Francisco will feature tracks on both trends where attendees can learn about the latest deve…

Overlapping Criminal and State Threats Pose Growing Cyber Security Threat to Global Internet Commerce, Says Open Group Speaker

By Dana Gardner, Interarbor Solutions This special BriefingsDirect thought leadership interview comes in conjunction with The Open Group Conference this January in San Francisco. The conference will focus on how IT and enterprise architecture sup…

The Era of Security Breaches

Print PDF Guest post by Gary Loveland and Nalneesh Gaur It seems like today’s organized data criminals have re-doubled their efforts to get their hands onto your customer’s data, and into their wallets. A full 85% of all data-related security breaches today are masterminded by organized crime, according to a 2010 Verizon Data Breach research report. These criminals are using anything and everything to spy out opportunity and penetrate defenses: from viruses and malware and […]

If you liked this, you might also like:

  1. 4 Considerations When Shopping the Google Apps Marketplace
  2. How to Make Decision Making More Adaptable with Layers
  3. Using Data Analysis to Predict the Future