Archive for April, 2012

Apr
29

How Important Is Ethical Hacking For Enterprise Security Architecture?

The rising threats to company data and information associated with new technologies such as cloud computing, virtualization and outsourcing pose a significant challenge for security defense. Ethical hacking has become an increasing popular means by which to assess technological concerns and solutions to attacks on company’s virtual property.
Ethical hacking consists of an emulated attack on an organization in order to find weaknesses and entry points that real hacker may be able to exploit. The security measures are assessed and the ethical hacking organization can recommend security implementations that will deter and prevent future attacks. The expert, objective review of a third-party to evaluate a company’s security requires that the ethical hacking company guarantee confidentiality and privacy as well as show accreditation by the EC-Council. With rapidly evolving business practices and security technologies the security defenses may best be maintained by ethical hacking services.

View original article…

Apr
28

Gartner Outlines 5 Cloud Computing Trends – What They Really Mean

Gartner has come up with an idea of the five cloud computing trends such as formal decision, Hybrid Cloud Computing, Cloud Brokerage, Cloud-Centric Design and Cloud Computing will influence the Cloud Strategy through 2015. According to him cloud computing is very powerful that will change our lifestyle of work. As per a survey conducted by Forrester, 72 percent of CIOs have interpreted that cloud is independent of IT. 58 percent were using mission-critical workloads in public clouds. Amazon predicts that clouds make 7 transformations on applications such as ease of distributed architecture, embrace security, enables to move from scaling, supercomputing, big data with big servers etc. So, we can conclude that cloud computing is a slow and steady and will help in Paradigm shift of application design. Cloud is revolution that will change typical relation with the data base.

View original article…

Apr
27

Logica wins contract to manage United Energy and Multinet Gas IT infrastructure

Logical Australia is a Business Service Provider. It has won a contract to provide technical support in Information Technology field for United Energy Co and Multinet Gas Company. The services also include providing service desk, desk top, server, storage and networks. The deal also includes Disaster Recovery and security services. The contract will continue for several years. United Energy Co is a electricity distributor in southeast Melbourne and Multinet Gas Co distributes gas in Victoria region. Logica is providing technical knowhow and equipment to detect faults in the system and make sure that the entire operation runs smoothly. Logica will also take care of third party activities of both the companies. In order to supervise corporate IT functions, Logica will be using a Australian based service desk.

View original article…

Apr
26

KPMG Sponsors Cloud Identity Summit 2012

Experience cloud identity security solutions in action at the KPMG sponsored Cloud Identity Summit 2012 taking place July 16-20 at Vail, Colorado’s Cascade Resort. The Cloud Identity Summit brings together the brightest minds in the business of identity and security, and has very quickly become the launch pad for driving consensus on adapting new technology innovations, advancing standards and best practices in enterprise security.

The Cloud Identity Summit combines content based presentation sessions with hands-on workshops and discussion panels, delivered by key members of KPMG’s Information Protection & Business Resilience (IPBR) practice and other leading practitioners of enterprise security from across the world.

Apr
25

Five Reasons Old Tech Still Shines

This is an article written by Tim Parker. He says that the old technologies are not catching its attention in the share market. People are going behind the new technology and they are least cared of the old technologies. He is asking that why we need to invest money on Intel if we can get it in Apple and he question the requirement of buying CSCO if we can get it in YELP. The stock market is really a fluctuating one in the case of technology sector. The new names are given prime importance and the old one are not considered. he say that for long run portfolio give preference to old one. He says that old technologies are making the infrastructure for the new one. So as per the development today out of 10 of top companies 5 are older technology and no new technology is found.

View original article…

Apr
23

IT migration costs Tesco Bank £40m as parent sees profit rise

Reports revealed that UK banking company Tesco has lost nearly 40 Million Euros due to delayed product launches and and a shift to a new computer system. But Tesco bank which pulled off from the joint venture with Royal Bank of Scotland three years ago saw it’s profits rose to 13.6 per cent. The company has said that it has lost money because of delay in product launches like the launching of Mortgages and other services. While it’s parent company the Tesco group had a significant amount of growth and it’s profits went to £3.9 billion. The bank has now migrated to the new electronic infrastructure.

View original article…

Apr
22

Cloud computing in the real world

It’s official and Google is set to launch it’s own Cloud storage service called Drive and everyone can store up to 5 GB of data in it. But many feel it as a bit late as many companies like Dropbox and SugarSync have been in this service for so many years and they have huge amount of people using it. Google has a stiff competition in this area as it’s rival Microsoft too has it’s own service where users can store up to 25 GB of data whereas in Dropbox and SugarSync you can store up to 2 GB and to store more you have to pay them.

View original article…

Apr
21

The Importance of Ethical Hacking: Emerging Threats Emphasise Need for …

A recent paper by Frost & Sullivan tells about how ethical hackers are important in an organization. With many companies falling as victims to cyber crime these people will help to prevent those attacks or security breach in a system. They provide a detailed analysis and helps the companies to improve their systems. These people provide detailed information about the vulnerabilities in the system and provide remedies for them. Many companies provide these services and High-Tech Bridge is one of the market leaders in the industry. These companies provide services to many Multi National Companies and this industry is growing at a rapid rate.

View original article…

Apr
20

Why a “rules based” approach to Change Management always fails

This article poaches some of the better ideas from information technology managers, as found in discussion board sites. The main topic for consideration is change and change management. The main respondent to a question about this, Glen Taylor, IT Vice President for Walt Disney Parks and Resorts, suggests that change approval is a very contested area in IT. He goes on to state that a purely rules based system for change approval management is doomed to failure. Change will come, but it needs to be anticipated, assessed objectively, mitigated appropriately, and clear judgment (inferred to be needed on a case by case basis) needs to be employed.

View original article…

Apr
20

CIOs face forced return to big outsourcing

Senior IT executives are faced with decisions and choices when their companies are having a cash flow problem. For a company struggling to meet budget crunches IT becomes a expense that needs to be slashed. CIOs are under pressure to cut costs. Rather than having in house staff, to save money companies will turn to outsourcing for their IT needs. The question then what kind of contract to sign with an outsource company. Pay careful attention to the details whether you want a long term contract. Long term contracts offer more leverage in the service received and the costs. Consideration should be given if your company wishes to switch to cloud based services in the future as that industry becomes more prevalent. Negotiating your contract may require flexibility as related to your future needs.

View original article…