More on identity and Mask

Who or what is ‘I’? How does our experience of ‘I’ change as we interact with our world? Yes, I do know that those questions might seem to fit more in philosophy or psychology. But as per the previous post, they also have huge ramifications in user-experience and user-interface design, in product-design, in sensemaking and […]

Identifier, identity, persona and Mask

Who or what is ‘I’? How do others recognise that ‘I’? How does that ‘I’ express itself? – with what voice does that ‘I’ speak? And how do others recognise that voice? Yeah, I know, sounds like philosophy and stuff – woefully abstract, deep and pointless. Yawn. But those ‘pointless’ questions are the core – the […]

The Era of Security Breaches

Print PDF Guest post by Gary Loveland and Nalneesh Gaur It seems like today’s organized data criminals have re-doubled their efforts to get their hands onto your customer’s data, and into their wallets. A full 85% of all data-related security breaches today are masterminded by organized crime, according to a 2010 Verizon Data Breach research report. These criminals are using anything and everything to spy out opportunity and penetrate defenses: from viruses and malware and […]

If you liked this, you might also like:

  1. 4 Considerations When Shopping the Google Apps Marketplace
  2. How to Make Decision Making More Adaptable with Layers
  3. Using Data Analysis to Predict the Future

Cloud security and risk management

Are you ready to move to the Cloud? Risk management and cost control are two key issues facing CIOs and CTOs today. Both these issues come into play in Cloud Computing, and present an interesting dilemma for IT leaders at large corporations. Continue r…

Microsoft Canadian Colleges Exec Briefing – Data Sovereignty

John Weigelt, National Technology Officer, Microsoft Canada Data Sovereignty and Privacy John’s job is to avoid “those unintended consequences” around technology adoption. Discussion about what constitutes cloud computing especially being clear about the context.  SaaS, PaaS and IaaS all have different contexts and require different approaches when considering data security and privacy. Microsoft Infrastructure Investment – data […]

Related posts:

  1. Microsoft Canadian Colleges Exec Briefing – Data Center Management
  2. Microsoft Canadian Colleges Exec Briefing – Cloud Services for Education
  3. Microsoft Canadian Colleges Exec Briefing – Office 365

What’s the future of information security?

Today, Jan. 28, is Data Privacy Day around the world, and a time to think about organizational and global challenges relating to data security. What is your organization’s primary cybersecurity challenge? Take our poll and read on to learn about some of The Open Group’s resources for security professionals. Continue reading