June 9, 2011
The other day I wrote a post titled While the fat versus thin debate is no longer relevant in the cloud, ownership of and accessibility to sensitive data is now the key consideration, in which I broached the subject of data security in the cloud, especially as it relates to unwanted government access to confidential information. […]
September 10, 2010
The PI Window on Business Show is launching a busy Fall schedule which includes our 200th Episode Anniversary Special and Live Event Feeds from both London and Stockholm. For those who did not have the opportunity to tune in to the broadcast, here is the link to our 100th Episode Special . The Live Event […]
August 19, 2010
During eWorld I will be hosting a Roundtable discussion on Outsourcing focusing on key areas such as “Security in the Cloud.” Joining 30 plus year public sector veteran and the author of the seminal “Towards Tesco – improving public sector procurement” paper Colin Cram as a member of the guest panel will be Richard Stiennon. […]
July 23, 2010
“For those of us in contracting, we spend hours crafting clauses and negotiating terms which are mostly of limited honesty or meaning. Is this because we really don’t care, or because we are blissfully unaware of the truth? Companies simply cannot promise complete security of data or information management. It is an area of relative […]
July 13, 2010
In yesterday’s post “Calculating Digital Capital and what it means to traditional ERP vendors” I had referenced an article by DK Matai that appeared in the July 12th edition of the Huffington Post. Titled “Digital Capital and Cloud Computing’s Asymmetric Risks,” I focused predominantly on the Digital Capital aspect of Matai’s musings as it related to […]
April 24, 2010
The following is a guest post by Richard Stiennon who will be my guest on the May 7th, 2010 PI Window on Business segment “Surviving Cyber War” on Blog Talk Radio at 12:30 PM EST. Note: This is the second guest post by Richard in the Procurement Insights Blog. The first “Look to how the […]
April 21, 2010
The following is a guest post by Richard Stiennon who will be my guest on the May 7th, 2010 PI Window on Business segment “Surviving Cyber War” on Blog Talk Radio at 12:30 PM EST. Note: A second guest post by Richard through the Procurement Insights Blog will appear here on Friday, April 23rd. Perhaps […]
April 18, 2010
Because the United States is the most Internet-dependent and automated in terms of supply chain, banking, transportation-control systems and other modern facilities, it’s also the most vulnerable to cyberattack, Clarke argues. And the military’s dependence on the Internet also means it would be vulnerable to disruptions of it. From Fox Business “Cyber War”‘ author: U.S. […]
Top PI Blog Posts Countdown No. 5: How Vulnerable Are We To A Cyberattack?
October 29, 2012
2
Editor’s Note: As we approach my 1,000th Procurement Insights blog post, over the next week I will be sharing with you the top 5 articles that garnered the most reads overall. Today’s submission, which ranked number 5 with 6,195 reads, was written on April 18th, 2010 as a follow-up to my interview with Richard Stiennon. […]