Will Kelly

About Me

Will Kelly is Senior Technical Writer at CSRA Inc, a provider of high-tech IT solutions to the government IT market. He has published bylined articles on a range of topics including DevOps, enterprise mobility, and cloud computing, and other technologies on sites such as SearchITOperations, DevOpsAgenda, Mobile Business Insights, CNET TechRepublic, and others.

Are Connected Devices Out of Control? Managing IoT Risk

Concerns about IoT security risks remain at an all-time high—and well they should. Your organization’s move to the IoT needs to happen in step with fundamental changes to how you handle risk management, security training, endpoint security, and nearly every security and operations task in between to ensure your enterprise security in the IoT age. It’s time we ask if our connected devices are out of control. The proliferation of these devices presents growing risk management issues for consumers and enterprises alike. Here are some common ways to manage IoT risk.

Five Reasons to Move to a Decentralized Collaboration Model

Your enterprise must take to ensure security, governance, and compliance over the content and communications that take place through your enterprise collaboration tools. The good news is that this work takes place at one level, and what comes from that work can become a set of standard policies to govern team-level collaboration sites. It’s essential to create corporate policies and training for teams that may be opening their collaboration sites to external parties.

AI’s Role in Next-Generation Enterprise Collaboration

Artificial intelligence (AI) is poised to tip new enterprise collaboration in a positive direction as it takes a more significant role in the platform search functionality and UX. The introduction of AI to enterprise collaboration means that your content can meet users where they are. It takes out the poor UX and the need for human intervention to track down needed documents on deadlines. Here’s how the role of AI will play out in the next generation of enterprise collaboration.

Three Strategies for Securing Containerized Applications in the Cloud

It is important not to let yourself get caught up in the market hype about containers and the advantages they offer your application delivery teams. Keep a strong security focus starting at preproduction and moving forward. You’ll get an edge on container security if you apply technology, tools, frameworks, and—above all—preparation to your containers in and out of production. Security news about containers has been mixed so far. Here are three strategies for securing your containerized applications.

How Safe Are Your Data in a Software-Defined Storage Solution?

Software-defined storage (SDS)  hits all the right enterprise storage trends, but it’s still an emerging technology for the average organization. Therefore, outsourcing SDS to a hyperscale or other CSP is probably the best option for maintaining your data safety. With all of its appeal, some people and enterprises are wondering how safe their data are in an SDS solution. Here are some things to consider if you’re trying to answer that question for your own data.

Why DevSecOps Is More Than a Technology Stack

DevOps and now DevSecOps provide the tools for a much-needed cultural change inside many of today’s enterprises. Success with DevSecOps comes from being able to separate the technology stack from the data you can derive and channel into business and technology decisions. You can’t buy DevSecOps—the practice of putting security practices into your DevOps methodology—but there’s marketing noise that may make you think that you can buy your way into DevSecOps.  When you’re moving your enterprise teams to a DevSecOps model, you need to see it as more than just a technology stack. Here’s why.

IoT Threat Modeling Made Easy

As you roll out more IoT devices, it’s time to add IoT threat modeling – a structured approach to identifying, quantifying, and addressing IoT security risks to your cybersecurity strategy. Moving to IoT threat modeling should be a cross-functional team exercise that you make part of your overall IoT development and management processes and frameworks. If your enterprise isn’t there yet, IoT threat modeling is the first step in growing your IoT security and integrating it into your overall cybersecurity strategy.

Bringing Your Marketing Team into the World of DevOps

As your marketing team marches toward the cloud and more automation, it’s a perfect time to bring DevOps practices to the development and operations of your marketing technology stack. Bringing marketing into your DevOps teams and overall culture can only help boost collaboration and communications during product launch and go-to-market activities. While some people talk about bringing agile and DevOps to marketing tasks, this post focuses on how you can bring your marketing team into a DevOps state of mind.

Put Users First and Change Management Second

Organizations going through digital transformation need to put their business users first, unfiltered by an Organizational change management (OCM) team and processes to ensure they are moving ahead to improve their operations. This article isn’t about throwing OCM out; rather, it’s about putting your business users on the front lines of digital transformation and reducing the bureaucracy that comes with that transformation. When you involve your business user community in your change efforts at a deeper level, you have additional insurance that your efforts are on target.

The Harvard Innovation Lab

Made in Boston @

The Harvard Innovation Lab


Matching Providers

Matching providers 2
comments powered by Disqus.