Dale R. Gardner

Subscribe to Dale R. Gardner: eMailAlertsEmail Alerts
Get Dale R. Gardner: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dale R. Gardner

The scale and automation of cloud computing deliver economies of scale - and price points - that can't be matched by traditional computing platforms. Managers can minimize capital expenses and align operational costs to business demands with scalable, flexible resource deployments. Those same factors enable innovation through rapid prototyping and testing of complex systems that aren't feasible - or affordable - with established approaches. It's little wonder the cloud has emerged as the first choice of infrastructure for many IT managers and practitioners. Security and compliance play just as critical a role in the hybrid cloud as they do in more conventional environments. So it's unfortunate that as organizations move operations to the cloud they tend to mirror the protection efforts they employ with their physical, on-premise systems. It's a mistake because in m... (more)

Requirements for Next-Generation Privileged Identity Management

The importance of privileged identity management as a means of managing risk has long been understood. After all, it's reported 43% of security breaches involve trusted insiders, according to research group Forrester. And the most recent Verizon Data Breach report revealed some 13% of breaches result from privilege misuse or abuse, and 76% involved weak or stolen credentials (of all types). However, the widespread adoption of cloud computing has significantly increased the consequences of these risks. As was pointed out recently by Gartner Research Director Nick Nikols, "Adminis... (more)

2014 Trends – The Year of the Insider Threat

If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders - case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, there is now an added layer of complexity and sophistication when it comes to protecting who can access what types of sensitive data. The cloud makes it easier for organizations to conduct business, but that simplicity also translates into easier ways for insiders or un-trusted individuals to steal da... (more)