Posts Tagged ‘ Security ’

This Week in Enterprise Tech – Rugged DevOps and DevSecOps with Splunk | TWiT

This Week in Enterprise Tech – Rugged DevOps and DevSecOps with Splunk | TWiT

OMGWTFBBQ, Monzy Merza (my partner in cyber at Splunk) and I were totally invited to be on This Week in Enterprise Tech with the Padre, Fr. Robert Ballecer, SJ, Curt Franklin, and  Louis Maresca! In this episode, The Padre asks, “We’ve been hearing a lot about the emergence of ‘DevSecOps’, or ‘Rugged DevOps’. How did this movement come about and in what ways do DevOps and security intersect?” Monzy and I had a great talk with all the show hosts, and the online audience, about what we’ve learned about DevOps and DevSecOps, Rugged DevOps, DevOpsSec, or whatever you call it – and a whole lot more. Check it out in podcast, vdeo, or a bunch of download options over at TWiT.tv , or check the YouTube below … via This Week in Enterprise Tech 223 Rugged DevOps with Splunk | TWiT.

Read more »

DevOps: A Culture Shift, Not A Technology – InformationWeek

DevOps: A Culture Shift, Not A Technology – InformationWeek

I am extremely grateful to my mate Charlie Babcock over at InformationWeek for publishing a great article on DevOps, featuring some of my ideas on this new approach for accelerating delivery of new applications and services. “The term ‘DevOps’ is a horrible one,” said Mann at a talk on “What Smart Businesses Know About DevOps” at the InformationWeek Conference in Las Vegas March 31, and also in an interview afterward. DevOps suggests that the life of a software application “begins with development and ends with operations,” when in fact it may be under continuous development to reflect changing business conditions. Please head over to InformationWeek to read the full article, DevOps: A Culture Shift, Not A Technology – InformationWeek. btw, you can see my whole presentation from the InformationWeek Conference, TechInsights Research: What Smart Businesses Know About DevOps‘, on SlideShare. The deck is embedded in miniature below, or click through…

Read more »

Wearable tech is here – are you ready?

Wearable tech is here – are you ready?

  Today I was privileged to have RCR Wireless publish my new article on wearable technologies, titled ‘Wearable tech is here – are you ready?‘: As businesses take the lead in delivering compelling new services with wearable technology, they have to step up their game to be sure wearable tech meets consumer expectations. With wearable technology, you’re enhancing the customer experience. But you’re also adding another layer of things that can go wrong and end up annoying that customer. Wearable is beginning to transition from an interesting, convenient new tech to something that businesses and consumers rely on. What was once gee-whiz amazing is now something we just take for granted. The same will happen as wearable technology becomes more successful. Read more at the original, over at RCR Wireless – http://www.rcrwireless.com/article/20140413/readerforum/reader-forum-wearable-tech-ready/

Read more »

Big Data, Big Risk – My Upcoming Session at Data360

Big Data, Big Risk – My Upcoming Session at Data360

I am excited to be a panelist at a great session for the upcoming Data 360 Conference, co-located with the HealthTech Conference, to be held at the Computer History Museum in Mountain View, California April 2-3, 2014. The session itself is called “Big Data Big Risk : Protecting PII From Penetration, Prying, and Proliferation”, and will be held April 2 at 9am-10am. The session addresses the increase in risk that comes with big data collection and storage; the greater likelihood of allowing some of that data (especially Personally Identifiable Information – PII) to leak or be penetrated; and how to secure and protect big data from these new risks and attacks, especially in Healthcare & Financial industry. I have some important areas to cover, and some customer stories to tell. Especially in finance and healthcare, the move to cloud and collaborative approaches like DevOps pose major risks for data protection,…

Read more »

Big Enterprises Need Big DevOps

Big Enterprises Need Big DevOps

The more I encounter organizations adopting a DevOps approach, the more I believe that everyone needs DevOps. I increasingly see how it addresses fundamental problems that nearly every IT organization faces. If you ask senior executives if their organizations are doing DevOps, you often get a blank stare. However, ask them if they are doing anything to foster better collaboration and communication between Development and Operations and you will find that there is not a single organization that is not doing something in this effort. I am also coming to understand that DevOps is at a crossroads and you can see the signs of it in the way companies are using DevOps. Like ITIL before it, instead of sticking to a “pure” DevOps methodology, many companies are adapting DevOps and forcing it to flex. DevOps is such a good idea, yet it is so utterly foreign for so many (especially…

Read more »

Consumer-Driven Development Creates a Governance Black Hole

Consumer-Driven Development Creates a Governance Black Hole

Consumerization of IT (CoIT) is rapidly giving way to Consumer-driven IT (CDIT), as tech-savvy consumers drive businesses to deliver increasingly innovative and satisfying technology experiences. As a result, consumer-driven development is focused heavily on delivering convenience, ease of use, mobility, low cost, rapid updates, and cool interfaces. This disruptive approach is enabling exciting innovations, from mobile apps for securely sharing personal photos with friends, to cloud services that let developers rapidly build and deploy environments. However, it also causes these same businesses to neglect some essential back-end requirements – like governance, security, and compliance.

Read more »

TechViews Unplugged – December 2013

TechViews Unplugged – December 2013

In this episode of TechViews Unplugged, George Watt of CA Technologies and I discuss mobile security, cloud providers, green IT, green cloud, and more! For more information, go to http://www.CA.com/Insights      

Read more »

Fantastic Cloud Expo West … Again!

Fantastic Cloud Expo West … Again!

This past week I attended the 13th International Cloud Expo West out in Santa Clara. Once again it was a fantastic event. I had meetings with some really interesting start-ups in cloud, attended several excellent sessions, met with some great friends from years past, and made some new friends too. Apart from all that, I was there to present too. My session was on “Harnessing APIs to Deliver Competitive Applications in the ‘Cloud Of Clouds’”. You can read the abstract here, or you can download a PDF of the whole deck here. I guess it was perhaps an overly SEO-heavy title, but in all seriousness, the intersection of rapid innovation, cloud computing, API economy, and devops – the core of this presentation – is a critical space that I am very excited about. In this preso, I explained the modern consumer-driven world of IT, where customers and staff expect everything…

Read more »

▶ TechViews Unplugged: September 2013

▶ TechViews Unplugged: September 2013

In this episode of TechViews Unplugged, Andi Mann and George Watt of CA Technologies discuss smartwatches, iPhone 5S, quantum computing, car hacks, and enterprise mobility. via ▶ TechViews Unplugged – Quantum Computing, Samsung’s Smartwatch, Enterprise Mobility & More! – YouTube.

Read more »

TechViews Unplugged: August 2013

TechViews Unplugged: August 2013

In this episode of TechViews Unplugged, Andi Mann and George Watt of CA Technologies discuss mobile PCs, SIM card hacks, the Internet of Things, cows with internet sensors, cloud computing and more! via TechViews Unplugged – Mobile PCs, SIM Card Hack, The Internet of Things – YouTube.

Read more »

How hybrid cloud is hastening the demise of traditional firewall security – Network World

How hybrid cloud is hastening the demise of traditional firewall security – Network World

I spoke with Brandon Butler of Network World recently about the future of the firewall, and he put some of my comments in a great article titled, How hybrid cloud is hastening the demise of traditional firewall security. You should totally go and read it over at Network World, but to give you a taste …  It’s not a new notion, but one that is gaining adherents: Perimeter-based security options like firewalls and access controls just will not cut it for new technologies that expand beyond corporate networks. “Identity is the new perimeter,” said Andi Mann, a vice president at CA Technologies, during a Google Hangout with other cloud experts sponsored by Datamation recently. “You can’t lock down by firewalls any more – you can’t even really lock down by application access anymore because you’re getting portions of an application from different services and different providers.” See the original via…

Read more »