A Shift In Security & Risk Research

Rob Whiteley src="http://www.forrester.com/role_based/images/author/imported/forresterDotCom/Analyst_Photos/Silhouette/Color/Robert_Whiteley.gif" border="0" style="FLOAT: left; MARGIN: 0px 5px 5px 0px" />

Read more

Remote Access And Virtualization: Not One And The Same

Some of you may have seen me tweeting recently about a little experiment that I have going on where I'm using a small PC (perhaps we can call it a netbook, but that's a semantics issue) — the Nokia Booklet 3G — as my primary computing device outside of the office.

Read more

Note To CISOs: Be the Automator, Not The Automated

Rob Whiteley

I’d like to take a small commercial break from your regularly scheduled security & risk programming to bring you the following observation . . .

I was recently in a client session with one of our great infrastructure & operations (I&O) analysts, Glenn “Automation” O’Donnell. His research on IT automation is extremely interesting both tactically (advice for improving IT operations) as well as philosophically (a call to arms for IT professionals to update their skill set — or risk obsolescence).

Anyway, in this session Glenn made a great observation: IT is at a key inflection point in 2009 and it’s never going back. He was distilling the result of three IT macro-level events colliding: 

  • Business Technology (BT) architecture redefining how we define IT services
  • Cloud computing and virtualization redefining how we build IT services
  • Automation and ITIL redefining how we run IT services

But the big takeaway form me was automation. It’s the main ingredient in transforming information technology.

And now as we return to our regularly scheduled security & risk programming I’d like to pose the following question: What is automation doing for information security? My take: Not much.

Sure, we see pockets of automaton in information security. I’ve seen:

Read more