For years, I’ve been reading predictions about new technologies that will render passwords obsolete. Then I click through and inspect the details and I wind up shaking my head. There are plenty of clever identity technologies working their way into the mainstream, but passwords will remain a necessary evil for many years to come.
And unless you want to be a sitting duck on the Internet, you need a strategy for managing those passwords. Large organizations can create sensible password policies and use single-sign-on software, but small businesses and individuals are on their own.
Also: The Best Password Managers of 2019 CNET
As best practices go, the rules for creating passwords are simple: Use a random combination of numbers, symbols, and mixed-case letters; never reuse passwords; turn on two-factor authentication if it’s available.
There’s some disagreement on whether you should change passwords regularly. I think there’s a strong case to be made for changing passwords every year or so, if only to avoid being innocently caught up in a database breach.
And, as far as I am concerned, the most important rule of all is use a password manager.
I have used several software-based password managers over the years and can’t imagine trying to get through the day without one.
I know people who keep password lists in an encrypted file of some sort. That’s exactly what a software-based password manager does. But that’s where the resemblance stops.
In this article, I explain why I consider a password manager essential, with links to five programs that I recommend. I also tackle some of the arguments I routinely hear from skeptics.
The case for password managers
The five programs that I have examined for this article are all similar in their core features. On a Windows PC or a Mac, you install a program that does the work of saving sets of credentials in a database whose contents are protected with AES-256 encryption. To unlock the password database, you enter a decryption key (your master password) that only you know.
Password managers that sync your password database to the cloud use end-to-end encryption. The data is encrypted before it leaves your device, and it stays encrypted as it’s transferred to the remote server. When you sign in to the app on your local device, the program sends a one-way hash of the password that identifies you but can’t be used to unlock the file itself.
Also: Why nearly 50% of organizations are failing at password security TechRepublic
The companies that manage and sync those saved files don’t have access to the decryption keys. In fact, your master password isn’t stored anywhere, and if you forget it, you’re out of luck. There’s no known way to crack an AES-256 encrypted file that’s protected with a strong personal key.
That architecture offers five distinct advantages over a DIY solution.
One: Browser Integration
Most password managers include browser extensions that automatically save credentials when you create a new account or sign in using those credentials for the first time. That browser integration also allows you to automatically enter credentials when you visit a matching website.
Contrast that approach with the inevitable friction of a manual list. You don’t need to find a file and add a password to it to save a new or changed set of credentials, and you don’t need to find and open that same file to copy and paste your password.
Two: Password Generation
Every password manager worth its salted hash includes a password generator capable of instantly producing a truly random, never-before-used-by-you password. If you don’t like that password, you can click to generate another. You can then use that random password when creating a new account or changing credentials for an existing one.
Most password managers also allow you to customize the length and complexity of a generated password so you can deal with sites that have peculiar password rules.
With the possible exceptions of John Forbes Nash, Jr., and Raymond Babbitt, mere mortals are not capable of such feats of randomization.
Three: Phishing Protection
Integrating a password manager with a browser is superb protection against phishing sites. If you visit a site that has managed to perfectly duplicate your bank’s login page and even mess with the URL display to make it look legit, you might be fooled. Your password manager, on the other hand, won’t enter your saved credentials, because the URL of the fake site doesn’t match the legitimate domain associated with them.
Also: Google releases Chrome extension to check for leaked usernames and passwords
That phishing protection is probably the most underrated feature of all. If you manage passwords manually, by copying and pasting from an encrypted personal file, you will paste your username and password into the respective fields on that well-designed fake page, because you don’t realize it’s fake.
Four: Cross Platform Access
Password managers work across devices, including PCs, Macs, and mobile devices, with the option to sync your encrypted password database to the cloud. Access to that file and its contents can be secured with biometric authentication and 2FA.
By contrast, if you manage passwords in an encrypted file that’s saved locally, you have to manually copy that file to other devices (or keep it in the cloud in a location under your personal control), and then make sure the contents of each copy stay in sync. More friction.
Five: Surveillance Safeguard
Password managers generally offer good protection against “shoulder surfing.” An attacker who’s able to watch you type, either live or with the help of a surveillance camera, can steal your login credentials with ease. Password managers never expose those details.
Even armed with those arguments, when I make that recommendation to other people, I typically hear the same excuses.
“I already have a perfectly good system for managing passwords.”
Usually, this system involves reusing an easy-to-remember base password of some sort, tacking on a special suffix or prefix attached to that base on a per-site basis. The trouble with that scheme is that those passwords aren’t random, and if someone figures out your pattern, they pretty much have a skeleton key to unlock everything. And a 2013 research paper from computer scientists at the University of Illinois, Princeton, and Indiana University, The Tangled Web of Password Reuse, demonstrated that attackers can figure out those patterns very, very quickly.
More importantly, this sort of scheme doesn’t scale. Eventually it collides with the password rules at a site that, say, doesn’t allow special characters or restricts password length. (I know, that’s nuts, but those sites exist.) Or a service forces you to change your password and won’t accept your new password because it’s too close to the previous one and now you have another exception to your system that you have to keep track of.
Also: How to manage your passwords effectively with KeePass TechRepublic
And so you wind up keeping an encrypted list of passwords that are not exactly unique and not exactly random, and not at all secure. Why not just use software built for this purpose?
“If someone steals my password file, they have all my passwords.”
No, they don’t. They have an encrypted file that is, for all intents and purposes, useless gibberish. The only way to extract its secrets is with the decryption key, which you and you alone know.
Of course, this assumes you’ve followed some reasonable precautions with that decryption key. Specifically, that you’ve made it long enough, that it can’t be guessed even by someone who knows you well, and that you’ve never used it for anything else.
If you need a strong and unique password, you can generate one at correcthorsebatterystaple.net, which uses the surprisingly secure methodology from this classic XKCD cartoon.
You definitely shouldn’t write that key down on a sticky note or a piece of paper in your desk drawer, either. But you might want to write down that password and store it in a very safe place or with a very trusted person, along with instructions for how to use it to unlock your password file in the event something happens to you.
“I don’t trust someone else to store my passwords on their server.”
I understand the instinctive reaction that allowing a cloud service to keep your full database of passwords must be a horrifying security risk. Like anything cloud-related, there’s a trade-off between convenience and security, but that risk is relatively low if the service follows best practices for encryption and you’ve set a strong master password.
But if you just don’t trust the cloud, you have alternatives.
Also: 57% of IT workers who get phished don’t change their password behaviors TechRepublic
Several of the password managers I’ve looked at offer the option to store a local-only copy of your AES-256 encrypted file, with no sync features whatsoever. If you choose that option, you’ll have to either forgo the option to use your password manager on multiple sites or devise a way to manually sync those files between different devices.
As a middle ground, you can use a personal cloud service to sync your password files. 1Password, for example, supports automatic syncing to both Dropbox and iCloud, ensuring that you’re protected even if one of those services is compromised.
“I’m not a target.”
Yes, you are.
If you’re a journalist working on security issues, or an activist in a country whose leaders don’t approve of activism, or a staffer on a high-profile political campaign, or a contractor that communicates with people in sensitive industries, you’re a high-value target. Anyone who fits in one of those categories should take opsec seriously, and a password manager is an essential part of a well-layered security program.
But even if you’re not an obvious candidate for targeted attacks, you can be swept up in a website breach. That’s why Have I Been Pwned? exists. It’s easy enough for a compromised website to force you to reset your password, minimizing the risk of that breach, but if you’ve used that same combination of credentials elsewhere, you’re at serious risk.
Five password managers worth considering
I have personally used all the programs in this list. For each one, I’ve included pricing details as well as a link to security information. Every paid program offers a free trial; I recommend taking advantage of those trials to see if a program is right for you.
Although this product earned its reputation on Apple devices, it has embraced Windows, Android, and Chrome OS as well. Personal subscriptions are $3 per month; a family option is $5 a month (both prices require annual billing). Password files can be stored locally, synced from 1Password’s servers, or connected to a Dropbox or iCloud account. Team, Business, and Enterprise accounts add 2-factor authentication and start at $4 per user per month. Security details here.
The youngest member of the group has been around for more than six years and has earned a reputation for ease of use. Apps are available for Windows PCs, Macs, Android, and iOS. If your password database includes fewer than 50 entries, you can get by with the free version. The $5-per-month Premium version includes a VPN option, and the $10-a-month bundle adds credit monitoring and identity theft features. Business plans include the same features as Premium, at $4 per user per month. Security details here.
If you’re cloud-phobic or if you insist on open source software, this is your option. KeePass runs on every desktop and mobile platform, including most Linux distros, and it’s free (as in beer). Files are stored locally, and you’ll want to master its arcane keyboard shortcuts to fill in passwords automatically. Browser integration is available via third-party plugins; for multi-device use, the program’s built-in sync engine automatically updates the password database in whatever cloud-based storage location you specify. Security details here.
Arguably the best known of the bunch, LastPass is free and works on all major desktop and mobile platforms. The service is cloud-based only, with files stored on the company’s servers and synced to local devices. A Premium version ($3 a month) supports advanced 2-factor authentication options; $4 a month covers a family of up to five. Business plans start at $4 per user per month. LastPass suffered an embarrassing data breach in 2015, shortly before the company was acquired by LogMeIn. Security details here.
Launched in 2000, RoboForm is by far the most senior member of the category. The free version supports unlimited logins and stores its database file locally. RoboForm Everywhere is a $24-a-year subscription service that adds cloud backup, sync, and 2-factor authentication features. The Family option ($48 a year) covers up to five users, and business plans cost $35 per user. Discounts are available for multi-year purchases. Security details here.
Affiliate disclosure: ZDNet earns commissions from the products and services featured on this page.
How APM, Observability and AIOps drive Operational Awareness
Ron Williams explains all to Jon Collins
Jon Collins: Hi Ron, thanks for joining me! I have two questions, if I may. One’s the general question of observability versus what’s been called application performance monitoring, APM – there’s been some debate about this in the industry, I know. Also, how do they both fit in with operational awareness, which I know is a hot topic for you.
Ron Williams: I’ll wax lyrical, and we can see where this goes – I’ll want to bring in AIOps as well, as another buzzword. Basically, we all started out with monitoring, which is, you know: Is it on? Is it off? Just monitoring performance, that’s the basis of APM.
Observability came about when we tried to say, well, this one’s performing this way, that one’s performing that way, is there a relationship? So, it is trying to take the monitoring that you have and say, how are these things connected? Observability tools are looking at the data that you have, and trying to make sure that things are working to some degree.
But that still doesn’t tell you whether or not the company is okay, which is where operational awareness comes in. Awareness is like, hey, are all the things necessary to run the company included? And are they running okay? That’s what I call full operational awareness. This requires information that is not in it to be combined with information that obviously IT operations has, and AIOps tends to be the tool that can do that.
So, Observability solutions serve an important function; it allows you to see the technical connections between objects and services, and why and how they may work. Awareness includes that and adds functional analysis, prediction, and prevention. But I’m not just talking about operational awareness as a technical thing, but in terms of the business. Let’s look at HR – this has an IT component, but nobody looks at that as a separate thing. If HR’s IT isn’t working, and if I’m the CEO, as far as I am concerned, HR is not working, and so the company is not working, even if other parts still function.
So, how do I gain awareness of all the pieces being brought together? AIOps is a solution that can do that, because it is an intelligent piece that pulls data in from everywhere, whereas observability is taking the monitoring data that you have, and understanding how those data relate to each other. APM gives information and insights, observability helps solve technical problems, whereas AIOps tools helps solve for business problems.
AIOps platforms are one tool that can combine both data sources real time IT operational awareness and Business operations awareness. Together, these constitute Organizational Awareness, that is, awareness across the company as a whole.
Jon: For my take on the benefits of observability platforms, bear with me as I haven’t actually used these tools! I came out of the ITIL, ITSM world of the 1990s, which (to me) was about providing measures of success. Back in the day, you got a dashboard saying things aren’t performing – that gave us performance management, anomaly detection, IT service management and so on. Then it went into business service management, dashboards to say, yeah, your current accounts aren’t working as they should. But it was always about presentation of information to give you a feel of success, and kick off a diagnostic process.
Whereas, observability,… I remember I was at a CloudBees user event, and someone said this, so I’m going to borrow from them: essentially, that solving where things are going wrong has become a kind of whodunnit. Observability, to me, is one of those words that describes itself. It’s not a solution, it’s actually an anti-word, it describes the problem in a way that makes it sound like a solution, actionable insights. It’s the lack of ability to know where the problems are happening in distributed architectures. That’s what is causing so much difficulty.
Ron: That’s a valid statement. Operational awareness comes from situational awareness, which was originally from the military. It’s a great term, because it says you’re sitting in the middle of the field of battle. Where’s the danger? You’re doing this, your head’s on a swivel, and you don’t know where anything is.
So operational awareness is a big deal, and it feeds the operation of not just IT, but the whole company. You can have IT operating at a hundred percent, but the company can be not making a dime, because something IT is not responsible directly for, but supports, is not working correctly.
Jon: I spoke to the mayor of the city of Chicago about situational awareness, specifically about snow ploughs: when there’s snow, you want to turn into a street and know the cars are out of the way, because once a snowplough is in a street, it can’t get out. I guess, from the point of view that you’re looking at here, operational awareness is not the awareness that IT operations requires. It’s awareness of business operations and being able to run the business better based on information about IT systems. Is that fair?
Ron: Yes. For the monitoring, are my systems OK, and is the company? Observability is, how are systems and the company behaving, why are they behaving that way, and what’s their relationship? Can I fix things without anything happening, and causing incidents? Awareness is a whole company thing – are all parts performing the way they should? Will something break, and if so, when? And can I prevent that from breaking?
That’s why operational awareness is more than situational awareness, which we can see as helping individuals – it’s aimed at the whole company, working with business awareness to drive organizational awareness. I’m not trying to invent concepts, but I am trying to be frank about what’s needed and how the different groups of tools apply. Operational awareness includes observability, monitoring, reporting and prediction, which is where AIOps comes in. You get all the pieces that we all know about, but when you put them together you get awareness of the operation of the company, not just IT. Observability and monitoring doesn’t include anything about business operations.
Jon: Is there another element? For the record, I hate maturity models because they never happen. But this is a kind of developmental model, isn’t it? From monitoring, to observability, and from this ability you want to improve to awareness. What you can also do is think upwards, from basic systems management, to IT service management to business service management.
Business service management was great, because it said (for example) people can’t access the current accounts. That’s really important, but what it wasn’t telling you was whether or not that’s doing you any damage as a company, so you can work across monitoring, through observability to operational awareness.
Another question, then, where can you get this operational awareness thing? I don’t suppose you can go down to Woolworths, pick up some operational awareness, stick it on a pallet, and wheel it home, so what do you do?
Ron: For a start, you must have all the pieces – if you don’t have monitoring, observability and all that you can’t get there, right? But then, one of the biggest pieces that’s missing is business awareness. The business, generally speaking, doesn’t communicate its operational state. This makes it hard – if my database isn’t running, what’s the impact of that? What does it mean to be fully aware? We can see this as a Venn diagram – if I draw another circle, it’s the whole circle, it’s the company.
Jon: Hang on, this is super important. If we go back to the origins of DevOps (we can argue whether or not it’s been successful since two thousand and seven, but bear with me on this), the origins of it were things like, “Black Friday’s coming up. How can we have the systems in place that we need to deliver on that?” It was very much from left to right – we need to deploy new features, so that we can maximize benefits, we need to set priorities and so on.
But the way that you said it was the business is not closing the loop. It’s up to the business to say, “I’m not able to perform. I’m not able to sell as much as I should be at the moment. Let’s look into why that is, and let’s feed that back to IT, so that I can be doing that better.” You’ve got the marketing department., the sales department, upper management, all the different parts of the organization. Then all need to take responsibility for their part in telling everyone else how well they are doing.
Ron: Absolutely. I almost put a fourth circle on my Venn diagram, which was the business side. But I decided to leave this, as it was about awareness as an intersection. It’s odd to me that many companies are not aware of all the things that are necessary to make them function as a company. They know that IT is a big deal, but they don’t know why or how or what IT’s impact is.
Jon: Yes, so bringing in elements of employee, experience and customer experience, and all those sorts of thing which then feeds the value stream management, strategic portfolio management aspects, knowing where to make a difference, shifting our needle according to the stakeholders that we have.
Ron: Yes, and all of that’s in awareness, you know!
Jon: That’s a great point to leave this, that the business needs to recognize it has a role in this. It can’t be a passive consumer of IT. The business needs to be a supplier of information. I know we’ve said similar things before, but the context is different – cloud-native and so on, so it’s about aligning business information with a different architecture and set of variables. Thank you so much, Ron. It’s been great speaking to you.
Ron: Thank you for letting me share!
The post <strong>How APM, Observability and AIOps drive Operational Awareness</strong> appeared first on GigaOm.
Can low code process automation platforms fix healthcare?
I was lucky enough to sit down with Appian’s healthcare industry lead, Fritz Haimberger. Fritz is someone who practices what he preaches — outside of his day job, he still spare-times as a medic and a firefighter in his hometown of Franklin, Tennessee (just outside Nashville). I’ve been lucky enough to work with various healthcare clients over the years, from hospitals to pharmaceutical firms and equipment manufacturers; I’ve also been involved in GigaOm’s low code tools and automation platforms reports. So, I was interested in getting his take on how this space has evolved since I last had my sleeves rolled up back in 2016.
While we talked about a wide range of areas, what really caught my attention was the recognized, still huge, challenge being faced by healthcare organizations across the globe. “If you look at healthcare over 15 years, starting with electronic medical record systems — for so long, we’ve had a continued expectation that those implementations might cost 500 million dollars and might be implemented in 14-16 months. Reality has never been like that: repeatedly, it’s been three years down the road, a billion dollars plus in expense, sometimes with no end in sight,” said Fritz. “The notion of implementation time to value was blown away, and organizations resigned themselves to think that it’s just not possible to deliver in a timely manner.”
In part, this comes from legacy tech, but equally, it is down to underestimating the scale of the challenge. When I was working on clinical pathways for Deep Vein Thrombosis (DVT), what started as a simple series of steps inevitably grew in complexity — what about if the patient was already being treated on other drugs? What if blood tests returned certain, conflicting information? So many of these questions rely on information stored in the heads of clinicians, doctors, nurses, pharmacists, and so on.
The resulting impact is not only on data models and systems functionality but also the way in which information needs to be gathered. Keeping in mind that healthcare scenarios must, by their nature, be risk averse, it’s not possible to build a prototype via “fail fast” or “test and learn” — real patient lives may be involved. So, how can healthcare organizations square the circle between addressing unachievable expectations without having the “do it quick and cheap” option?
Enter low code app development, integration, process, and other forms of automation development platforms. Let’s work back from the clichéd trick in the tale and agree that it won’t be a magic digital transformation bullet. You only have to look at a technical architecture map of the NHS to realize that you’d need an entire squadron of magic rockets to even dent the surface. But several elements of the low code process automation platform approach (okay, a bit of a mouthful, so I’ll stick with automation platforms from here) map onto the challenges faced by healthcare organizations in a way that might actually make a difference.
First off, the low code development platforms are not looking to either directly replace or just integrate between existing systems. Rather, and given their heritage, they are aimed at accessing existing data to respond to new or changing needs. There’s an industry term – “land and expand” – which is largely about marketing but also helps from a technical perspective: unlike historical enterprise applications, which required organizations to adopt and adapt their processes (at vast cost), the automation platform approach is more about solving specific challenges first, then broadening use — without imposing external constraints on related development processes.
Second, the nature of software development with automation platforms plays specifically to the healthcare context. Whilst the environment is absolutely safety critical, it’s also very complex, with a lot of knowledge in the heads of health care professionals… This plays to a collaborative approach, one way or another — clinicians need to be consulted at the beginning of a project but also along the way as clinical needs emerge. “The tribal knowledge breakdown is huge,” said Fritz. “With platforms such as Appian, professional developers, clinicians, and business owners can better collaborate on custom applications, so it’s bespoke to what they’re trying to achieve, in a quick iterative process.” Not only does this cut initial time to value down considerably – Fritz suggested 12-14 weeks – but also, it’s along the process that complexity emerges, and hence can be treated.
Automation platforms align with the way it is possible to do things, but at the same time, they are, inherently platforms. This brings to a third pillar that they can bake in the capabilities healthcare organizations need without having to be bespoke — security hardening, mobile deployment, healthcare compliance, API-based integration, and so on. From experience, I know how complex these elements can be if either relying on other parts of the healthcare architecture or having to build bespoke or buy separately — the goal is to reduce the complexity of custom apps and dependencies rather than creating them.
Perhaps automation platforms can, at the very least, unlock and unblock opportunities to make technology work for key healthcare stakeholders, from upper management to nursing staff and everyone in between. Of course, they can’t work miracles; you will also need to keep on top of your application governance — thinking generally, automation platforms aren’t always the best at version controls, configuration and test management, and other ancillary activity.
Above all, when the platforms do what they do best, they are solving problems for people by creating new interfaces onto existing data and delivering new processes. “Honestly— if I’m looking at the individual, whether it’s a patient in clinical treatment, a life sciences trial participant or an insured member – if we’re improving their health outcomes, and easing the unnecessary burden on clinicians, scientists and others, that’s what makes it worthwhile putting two feet on the floor in the morning and coming to work for Appian!”
Yes, platforms can help, but most of all, this is about recognizing that solving for business users is the answer: with this mindset, perhaps healthcare organizations really can start moving towards dealing with their legacy technical challenges to the benefit of all.
The post <strong>Can low code process automation platforms fix healthcare?</strong> appeared first on GigaOm.
Now’s the Moment to be Thinking About Sovereign Cloud
Sovereign Cloud was one of VMware’s big announcements at its annual VMware Explore Europe conference this year. Not that the company was announcing the still-evolving notion of sovereignty, but what it calls “sovereign-ready solutions.” Data sovereignty is the need to ensure data is managed according to local and national laws. This has always been important, so why has it become a thing now if it wasn’t three years ago?
Perhaps some of the impetus comes from General Data Protection Regulation (GDPR compliance), or at least the limitations revealed since its arrival in 2016. It isn’t possible to define a single set of laws or regulations around data that can apply globally. Different countries have different takes on what matters, move at different rates, and face different challenges. “Sovereignty was not specific to EMEA region but driven by it,” said Joe Baguley, EMEA CTO for VMware.
GDPR requirements are a subset of data privacy and protection requirements, but increasingly, governments are defining their own or sticking with what they already have. Some countries favor more stringent rules (Germany and Ghana spring to mind), and technology platforms need to be able to work with a multitude of policies rather than enforcing just one.
Enter the sovereign cloud, which is accelerating as a need even as it emerges as something concrete that organizations can use. In terms of the accelerating need, enterprises we speak to are talking of the increasing challenges faced when operating across national borders — as nations mature digitally, it’s no longer an option to ignore local data requirements.
At the same time, pressure is increasing. “Most organizations have a feeling of a burning platform,” remarked Laurent Allard, head of Sovereign Cloud EMEA for VMware. As well as regulation, the threat of ransomware is highly prevalent, driving a need for organizations to respond. Equally less urgent but no less important is the continuing focus on digital transformation — if ransomware is a stick, so transformation offers the carrot of opportunity.
Beyond these technical drivers is the very real challenge of rapidly shifting geopolitics. The conflict in Ukraine has caused irrecoverable damage to the idea that we might all get along, sharing data and offering services internationally without risk of change. Citizens and customers—that’s us—need a cast iron guarantee that the confidentiality, integrity, and availability of their data will be protected even as the world changes. And it’s not just about people—industrial and operational data subjects also need to be considered.
It is worth considering the primary scenarios to which data protection laws and sovereignty need to apply. The public sector and regulated industries have broader constraints on data privacy, so organizations in these areas may well see the need to have “a sovereign cloud” within which they operate. Other organizations may have certain data classes that need special treatment and see sovereign cloud architecture as a destination for these. And meanwhile, multinational companies may operate in countries that impose specific restrictions on small yet important subsets of data.
Despite the rapidly emerging need, the tech industry is not yet geared up to respond — not efficiently, anyway. I still speak to some US vendors who scratch their heads when the topic arises (though the European Data Act and other regulatory moves may drive more interest). Hyperscalers, in particular, are tussling with how to approach the challenge, given that US law already imposes requirements on data wherever it may be in the world.
These are early days when it comes to solutions: as says Rajeev Bhardwaj, GM of VMware’s Cloud Provider Solutions division, “There is no standard for sovereign clouds.” Developing such a thing will not be straightforward, as (given the range of scenarios) solutions cannot be one-size-fits-all. Organizations must define infrastructure and data management capabilities that fit their own needs, considering how they move data and in which jurisdictions they operate.
VMware has made some headway in this, defining a sovereign cloud stack with multiple controls, e.g., on data residency — it’s this which serves as a basis for its sovereign-ready solutions. “There’s work to be done. We’re not done yet,” says Sumit Dhawan, President of VMware. This work cannot exist in isolation, as the whole point of the sovereign cloud is that it needs to work across what is today a highly complex and distributed IT environment, whatever the organization’s size.
Sure, it’s a work in progress, but at the same time, enterprises can think about the scenarios that matter to them, as well as the aforementioned carrot and stick. While the future may be uncertain, we can all be sure that we’ll need to understand our data assets and classify them, set policies according to our needs and the places where we operate, and develop our infrastructures to be more flexible and policy-driven.
I wouldn’t go as far as saying that enterprises need a chief sovereignty officer, but they should indeed be embedding the notion of data sovereignty into their strategic initiatives, both vertically (as a singular goal) and horizontally as a thread running through all aspects of business and IT. “What about data sovereignty aspects” should be a bullet point on the agenda of all digital transformation activity — sure, it is not a simple question to answer, but it is all the more important because of this.
The post Now’s the Moment to be Thinking About Sovereign Cloud appeared first on GigaOm.
24% Of Apple Fans Think This Is The Best New Feature Of The MacOS Ventura
With more than 25.08% of the votes, a slim majority of our poll respondents chose the newfound ability to generate...
The Secret Photos Feature That Makes Your Hidden And Recently Deleted Photos More Secure
Much like with Notes, you can now set passwords for the Hidden and Recently Deleted albums in Photos and keep...
Patent detects in-game “collusion” by tracking “external connections”
Enlarge / Call it a hunch, but something tells me these two players are working together… Do you ever feel...
The WWII-Era Harley-Davidson That Was Originally Built For The Allied Troops
The Harley-Davidson XA motorcycle was an experimental machine meant for desert warfare in the desert of northern Africa, but another...
Nvidia AI plays Minecraft, wins AI conference award
Enlarge / MineDojo’s AI can perform complex tasks in Minecraft. Nvidia A paper describing MineDojo, Nvidia’s generalist AI agent that...
Social8 months ago
Web.com website builder review
Social3 years ago
CrashPlan for Small Business Review
Gadgets4 years ago
A fictional Facebook Portal videochat with Mark Zuckerberg – TechCrunch
Cars4 years ago
What’s the best cloud storage for you?
Mobile4 years ago
Memory raises $5M to bring AI to time tracking – TechCrunch
Social4 years ago
iPhone XS priciest yet in South Korea
Security4 years ago
Google latest cloud to be Australian government certified
Social4 years ago
Apple’s new iPad Pro aims to keep enterprise momentum