Concerns about IoT security risks remain at an all-time high—and well they should. Your organization’s move to the IoT needs to happen in step with fundamental changes to how you handle risk management, security training, endpoint security, and nearly every security and operations task in between to ensure your enterprise security in the IoT age. It’s time we ask if our connected devices are out of control. The proliferation of these devices presents growing risk management issues for consumers and enterprises alike. Here are some common ways to manage IoT risk.
Your enterprise must take to ensure security, governance, and compliance over the content and communications that take place through your enterprise collaboration tools. The good news is that this work takes place at one level, and what comes from that work can become a set of standard policies to govern team-level collaboration sites. It’s essential to create corporate policies and training for teams that may be opening their collaboration sites to external parties.
Artificial intelligence (AI) is poised to tip new enterprise collaboration in a positive direction as it takes a more significant role in the platform search functionality and UX. The introduction of AI to enterprise collaboration means that your content can meet users where they are. It takes out the poor UX and the need for human intervention to track down needed documents on deadlines. Here’s how the role of AI will play out in the next generation of enterprise collaboration.
It is important not to let yourself get caught up in the market hype about containers and the advantages they offer your application delivery teams. Keep a strong security focus starting at preproduction and moving forward. You’ll get an edge on container security if you apply technology, tools, frameworks, and—above all—preparation to your containers in and out of production. Security news about containers has been mixed so far. Here are three strategies for securing your containerized applications.
Software-defined storage (SDS) hits all the right enterprise storage trends, but it’s still an emerging technology for the average organization. Therefore, outsourcing SDS to a hyperscale or other CSP is probably the best option for maintaining your data safety. With all of its appeal, some people and enterprises are wondering how safe their data are in an SDS solution. Here are some things to consider if you’re trying to answer that question for your own data.
DevOps and now DevSecOps provide the tools for a much-needed cultural change inside many of today’s enterprises. Success with DevSecOps comes from being able to separate the technology stack from the data you can derive and channel into business and technology decisions. You can’t buy DevSecOps—the practice of putting security practices into your DevOps methodology—but there’s marketing noise that may make you think that you can buy your way into DevSecOps. When you’re moving your enterprise teams to a DevSecOps model, you need to see it as more than just a technology stack. Here’s why.
As you roll out more IoT devices, it’s time to add IoT threat modeling – a structured approach to identifying, quantifying, and addressing IoT security risks to your cybersecurity strategy. Moving to IoT threat modeling should be a cross-functional team exercise that you make part of your overall IoT development and management processes and frameworks. If your enterprise isn’t there yet, IoT threat modeling is the first step in growing your IoT security and integrating it into your overall cybersecurity strategy.
As your marketing team marches toward the cloud and more automation, it’s a perfect time to bring DevOps practices to the development and operations of your marketing technology stack. Bringing marketing into your DevOps teams and overall culture can only help boost collaboration and communications during product launch and go-to-market activities. While some people talk about bringing agile and DevOps to marketing tasks, this post focuses on how you can bring your marketing team into a DevOps state of mind.
Organizations going through digital transformation need to put their business users first, unfiltered by an Organizational change management (OCM) team and processes to ensure they are moving ahead to improve their operations. This article isn’t about throwing OCM out; rather, it’s about putting your business users on the front lines of digital transformation and reducing the bureaucracy that comes with that transformation. When you involve your business user community in your change efforts at a deeper level, you have additional insurance that your efforts are on target.