The Open Group Philadelphia – Day Two Highlights

By Loren K. Baynes, Director, Global Marketing Communications at The Open Group. Day 2 at The Open Group conference in the City of Brotherly Love, as Philadelphia is also known, was another busy and remarkable day. The plenary started with … Continue reading

The Open Group Philadelphia – Day One Highlights

By Loren K.  Baynes, Director, Global Marketing Communications at The Open Group. On Monday, July 15th, we kicked off our conference in Philadelphia. As Allen Brown, CEO of The Open Group, commented in his opening remarks, Philadelphia is the birthplace … Continue reading

Some BYOD Technology Recommendations

This is the sixteenth post in my series on BYOD. In my last post on the subject I discussed a range of technologies that can be used to solve issues raised by BYOD. Here I’d like to give my broad recommendations around which of those technologies are most likely to solve the kinds of problems […]

The Open Group Sydney – My Conference Highlights

By Mac Lemon, MD Australia at Enterprise Architects Well the dust has settled now with the conclusion of The Open Group ‘Enterprise Transformation’ Conference held in Sydney, Australia for the first time on April 15-20. Enterprise Architects is proud to have been recognised at the event by The Open Group as being pivotal in the success of … … Continue reading

Take A Better Look At Cloud Risks

If you have ever had a debate about whether your organisation should use cloud computing  then a discussion of the risks of cloud computing will have been a significant part of it. In doing so, we often fall into a simple logical trap. Cloud computing is just one of the options that we have.  The […]

What Are You Doing To Get Off XP?

In case you haven’t heard Microsoft is ending support for Windows XP and Office 2003 in April of 2014. What this means is that Microsoft will no longer patch security vulnerabilities discovered in XP or Office 2003, and therefore there will be security holes discovered that can be exploited by hackers which will never be […]

Developing standards to secure our global supply chain

By Sally Long, Director of The Open Group Trusted Technology Forum (OTTF)™ In a world where tainted and counterfeit products pose significant risks to organizations, we see an increasing need for a standard that protects both organizations and consumers. Altered or non-genuine products introduce the possibility of untracked malicious behavior or poor performance. These risks can damage … … Continue reading

An Overview of Mobility and BYOD Technology

This is the fifteenth post in my series on BYOD. I have mostly avoided talking about technology, as in many ways that is the least important, and the most straightforward aspect of dealing with BYOD. Most people automatically think of Mobile Device Management (MDM) when they think of mobile or BYOD technology, but that is far from […]

3 Steps to Proactively Address Board-Level Security Concerns

Security concerns around Big Data continue to the extent that it has become a Board-level concern that must be addressed. To do so, enterprises must provide the business justification for such proactive steps needed to address such board-level concerns. … Continue reading

Quick Hit Thoughts from RSA Conference 2013

One of the responsibilities (and benefits) of my job is getting to go to great conferences like the RSA Security Conference which just wrapped last week. This year I was honored to be selected by the Program Committee to speak twice at the event. Both talks fit well to the Policy and Government track at the show. … Continue reading

Beyond Big Data

The big bang that started The Open Group Conference in Newport Beach was, appropriately, a presentation related to astronomy. Chris Gerty gave a keynote on Big Data at NASA, where he is Deputy Program Manager of the Open Innovation Program. And that exploration – as is often the case with successful space missions – left us wondering what lies beyond. … Continue reading

Open Group Panel Explores Changing Field of Risk Management and Analysis in the Era of Big Data

This is a transcript of a sponsored podcast discussion on the threats from and promise of Big Data in securing enterprise information assets. Continue reading