Category Archives: security

Keep Corporate Away From Production

For a very long time, corporations treated their corporate networks as safe protected environments. The data and applications inside that network are: confidential and must be kept safe from unauthorized access (protect from loss), and crucial to business processes and must … Continue reading

Posted in business, cloud, policy, security, technology | Tagged , , , | Comments Off on Keep Corporate Away From Production

TrueCrypt: True Security, True Licensing

TrueCrypt was a great open-source encryption program. It created files that, when opened by the program, looked to your computer like an additional drive. Any files placed in that drive would be encrypted and protected from prying eyes. Why would you do … Continue reading

Posted in business, cloud, policy, product, security, technology | Tagged , , , , | Comments Off on TrueCrypt: True Security, True Licensing

Experience Matters… Especially In a Startup

There is a belief in startup-land that you have to be younger than ___ to successfully innovate. To some extent, that is driven by the youth of the founders of a few highly successful companies like Facebook and Twitter, magnified by the … Continue reading

Posted in business, policy, product, security, technology | Tagged , , , , | Comments Off on Experience Matters… Especially In a Startup

Yahoo’s On-Demand (In)Security

Passwords are insecure and annoying. I get that, I have written about it, and I experience it. So lots of companies and organizations are working on replacing passwords with something that is both more secure and more convenient. For example, Twitter’s … Continue reading

Posted in business, policy, product, security, technology | Tagged , , , , | Comments Off on Yahoo’s On-Demand (In)Security

Kill the SIM Card

About five months ago, I looked into the “Not-So-Simple SIM Card.” In short, I called for the abolition of the SIM-to-carrier-to-number tie. For those who never change carriers or travel, this doesn’t matter much. You get your phone, you go to your … Continue reading

Posted in business, policy, pricing, product, security, technology | Tagged , , , , | Comments Off on Kill the SIM Card

Whence Private Clouds, and Why Amazon and Google Should Spin Off Cloud

After our article last week discussing the economics of moving into AWS vs. do-it-yourself (DIY), Jim Stogdill wrote an excellent follow-up about when enterprises aren’t moving into the public cloud; Simon Wardley – whose strategic situational awareness mapping is in a category by itself and should … Continue reading

Posted in business, cloud, pricing, product, security, technology | Tagged , , , , , , , , | Comments Off on Whence Private Clouds, and Why Amazon and Google Should Spin Off Cloud

Hiding Fingerprints in Your Browser for Privacy

The browser is the single most ubiquitous piece of software on the planet. Nearly every computing device has at least one one. Because of its ubiquity, and its use across multiple applications from open (Google “how much does a banana … Continue reading

Posted in business, cloud, security, technology | Tagged , , , , | Comments Off on Hiding Fingerprints in Your Browser for Privacy

Superfish or Stupidfish?

How did Lenovo do something so inane as fundamentally breaking their customers’ laptop security by installing Superfish? What is Superfish, and what is wrong with it? I have often asked clients to consider, “what business are you in?” The right answer … Continue reading

Posted in business, policy, product, security, technology | Tagged , , , , , , | 1 Comment

Websites and the Cost of Change

You are reading this blog on WordPress. It is not a secret; any technologist with experience managing WordPress can look at the page and see that it is run by WordPress. How does WordPress show you this page? Here is what WordPress … Continue reading

Posted in business, cloud, product, security, technology | Tagged , , , , | Comments Off on Websites and the Cost of Change

Change Control in the Cloud

“We made a small change and it brought down our customers for 4 hours.”  – colleague “Network issues caused outage” – GoDaddy “A configuration error… caused days of downtime.” – Amazon “Facebook was down… for 2.5 hours.” – Facebook Every one … Continue reading

Posted in business, cloud, policy, security, technology | Tagged , , | Comments Off on Change Control in the Cloud