Gartner’s predictions for next year and beyond (ii)
continuing from
Gartner Top Strategic Predictions for 2018 and Beyond
Gartner’s predictions for next year and beyond
Aggregated enterprise architecture wisdom
continuing from
Gartner Top Strategic Predictions for 2018 and Beyond
Gartner’s predictions for next year and beyond
continuing from
Gartner Top Strategic Predictions for 2018 and Beyond
Gartner’s predictions for next year and beyond
Gartner Top Strategic Predictions for 2018 and Beyond.
Here they are, commented. But to me they sound like the de facto situation of today.
1. Consumers Favor Visual and Voice Search
That was on the cards for a some time n…
The B2B Breach Trifecta: Equifax, SEC, and Deloitte As rumors emerged this morning about a compromise of consulting firm Deloitte, this becomes the third breach announced in just a few short weeks of organizations that share a similar profile: Each one is primarily – or exclusively – a B2B organization. There are some questions worth […]
As a veteran of enterprise IT, there’s a difference between “hybrid by design” and “hybrid by accident.” Let’s be frank: you are probably doing hybrid by accident – just about everybody is. Hybrid by accident is: Integrating public cloud with on-premises tech without standardizing on a common infrastructure-as-code practice Shadow IT cloud “experiments” that suddenly […]
An architectural risk assessment is not a penetration test or merely a vulnerability scan. It is an engineering process with the aim of understanding, defining, and defending all the functional output from customers, line workers, corporate staff, and client-server interactions. Architectural risk assessments include ethical hacking, source code review, and the formation of a new Read more
An architectural risk assessment is not a penetration test or merely a vulnerability scan. It is an engineering process with the aim of understanding, defining, and defending all the functional output from customers, line workers, corporate staff, and client-server interactions. Architectural risk assessments include ethical hacking, source code review, and the formation of a new Read more
The number and complexity of cyberthreats are increasing. Traditional antimalware tools may not be adequate to protect your organization. As hackers create new, more-sophisticated malware, endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. Why is this important? Because employee endpoints are the interface between employees and […]
The Open Group Security Forum has published two recent white papers that will be of interest to Open FAIR users, and Risk Management professionals generally.
Episode 6 of this season of Architecture Corner is out (I made a guest appearance in episode 1, “Good at Innovation”). In this installment, the CIO is a glutton for new data center capacity. Chris the CEO (Casimir Artmann) and John the CIO (Greger Wikstrand) are convinced that “we are special”. Can Ann the CFO […]![]()
Long-time readers know that I have a rather varied set of interests and that I’ve got a “thing” for history, particularly military history. Knowing that, it shouldn’t come as a surprise that I was recently reading an article titled “Cyber is the fourth dimension of war” (ground, sea and air being the first three […]![]()
By Jim Hietala, VP, Business Development and Security, The Open Group Risk Practitioners should be informed about the Open FAIR body of knowledge, and the role that The Open Group has played in creating a set of open and vendor-neutral … Continue reading →![]()