November 29, 2011
The more important point is whether it matters in the first place. Hands up all those who know about employee group behavior that is wreaking havoc inside the enterprise as a result of bringing in unauthorised iPhones? I haven’t heard of such a case. I doubt we would except a long time after the event. […]
June 9, 2011
The other day I wrote a post titled While the fat versus thin debate is no longer relevant in the cloud, ownership of and accessibility to sensitive data is now the key consideration, in which I broached the subject of data security in the cloud, especially as it relates to unwanted government access to confidential information. […]
September 29, 2010
The following is a re-post from the Essential Connections Blog Broadcasting to both a virtual audience as well as a live audience simultaneously is exciting and energizing in that you have a rare opportunity to not only hear but see the reactions to a tremendously interesting and insightful guest panel, whose positions on the subject […]
September 10, 2010
The PI Window on Business Show is launching a busy Fall schedule which includes our 200th Episode Anniversary Special and Live Event Feeds from both London and Stockholm. For those who did not have the opportunity to tune in to the broadcast, here is the link to our 100th Episode Special . The Live Event […]
August 19, 2010
During eWorld I will be hosting a Roundtable discussion on Outsourcing focusing on key areas such as “Security in the Cloud.” Joining 30 plus year public sector veteran and the author of the seminal “Towards Tesco – improving public sector procurement” paper Colin Cram as a member of the guest panel will be Richard Stiennon. […]
July 23, 2010
“For those of us in contracting, we spend hours crafting clauses and negotiating terms which are mostly of limited honesty or meaning. Is this because we really don’t care, or because we are blissfully unaware of the truth? Companies simply cannot promise complete security of data or information management. It is an area of relative […]
July 13, 2010
In yesterday’s post “Calculating Digital Capital and what it means to traditional ERP vendors” I had referenced an article by DK Matai that appeared in the July 12th edition of the Huffington Post. Titled “Digital Capital and Cloud Computing’s Asymmetric Risks,” I focused predominantly on the Digital Capital aspect of Matai’s musings as it related to […]
April 24, 2010
The following is a guest post by Richard Stiennon who will be my guest on the May 7th, 2010 PI Window on Business segment “Surviving Cyber War” on Blog Talk Radio at 12:30 PM EST. Note: This is the second guest post by Richard in the Procurement Insights Blog. The first “Look to how the […]
April 21, 2010
The following is a guest post by Richard Stiennon who will be my guest on the May 7th, 2010 PI Window on Business segment “Surviving Cyber War” on Blog Talk Radio at 12:30 PM EST. Note: A second guest post by Richard through the Procurement Insights Blog will appear here on Friday, April 23rd. Perhaps […]
Top PI Blog Posts Countdown No. 5: How Vulnerable Are We To A Cyberattack?
October 29, 2012
2
Editor’s Note: As we approach my 1,000th Procurement Insights blog post, over the next week I will be sharing with you the top 5 articles that garnered the most reads overall. Today’s submission, which ranked number 5 with 6,195 reads, was written on April 18th, 2010 as a follow-up to my interview with Richard Stiennon. […]