IT Management

IT Management

Encryption key to cloud security

In the article below, Kevin Fogarty picks up cloud where he left it – with colourful discussion of security challenges that starts with the...

Innovate and integrate to connect security

‘An ounce of prevention is worth a pound of cure’ applies to more than stocking up on your vitamins. It is also a sound...

Here we go again

Innovation can be a wonderful thing. The trouble is, it's a two-edged sword that can be used for good or ill. And when there's...

Risks of public cloud multiply even as enterprise use surges

A few years back, raising the issue of data privacy was viewed in many IT discussions as a traitorous act. Dazzled by the economic...

Cloud relationships rule at Dell World 2014

Dell had a lot to crow about at its fourth annual user conference in Austin, Texas this week. In his opening keynote address at...

Dell trains eyes on security software

In building its Software Group, Dell has been careful to observe two key management maxims: the importance of integrating new capabilities to leverage the...

Vitamin Y: The value of (business) collaboration

Context: At InsightaaS, we write extensively about "collaboration" — and like many professionals with an IT bent, we often interpret the term itself as referring...

451 Research: 451 Security Summit – Securing the data supply chain, part 2

InsightaaS perspective: 451 Research is one of the world’s leading sources of insight into cutting edge technologies — including areas that are important to...

New InsightaaS whitepaper links security with success and profitability

A new Dell-sponsored whitepaper by InsightaaS ‘connects the dots’ between IT security practices and business success. The paper, which includes research conducted by Techaisle,...

Building cloud security from the end up

In the spring of 2009, Gartner identified data security as one of the top five inhibitors to broader adoption of cloud computing. Research commissioned...

Who can you trust?

Technology, like any tool, can be used well or badly. Sometimes the bad is malicious, and sometimes it's just the result of laziness, carelessness,...

Heartbleed should be making you sweat

It’s been a couple of months since news of the Heartbleed vulnerability first spawned global near-hysteria. The bug, which sat virtually unnoticed on approximately...

Digitization driving healthcare necessity and invention

A key beneficiary of the transformative impact of IT, healthcare is undergoing massive change. Like many other industries, this sector is renovating to set...

CASL and e-communications in Canada: in pursuit of the Dark Ages

Context: For many of us, the 1990s don’t seem like a very long time ago — but from a work mode perspective, they are almost...

Do you need a DRP for winter?

For anyone responsible for purchasing deploying, maintaining or even using technology in anything remotely approaching a business setting — meaning all of us —...