Many organizations have such a positive first experience with cloud computing that they quickly want to move to a hybrid cloud environment with data and workloads shared between private and public clouds. The flexibility and control that a hybrid cloud provides is why it is expected to be the dominant…
Read More
Congrats! You’ve landed a new job as a chief information security officer (CISO). Now where do you start? With some figures putting the typical CISO tenure at just around two years, it’s clear turnover in this role is high. According to a Ponemon Institute study sponsored by Opus, 44 percent…
Read More
Co-authored by Kevin Pratt Identity and access management (IAM) should be a seamless part of employees’ day-to-day activities and your organization’s overall security posture. An IAM program controls and administers the access users have to an array of critical systems and data. If your users have difficulty accessing systems and…
Read More
There’s a common expectation that the higher you go in any business, the less you see of your customers. But Laurene Hummer, senior offering manager for identity and access management (IAM) services at IBM Security, makes a point of taking every opportunity offered to speak with end users. Laurene works…
Read More