CLOUDWAN: OWNING AND OPERATING IN THE NEW WORLD OF NEXT GENERATION INFRASTRUCTURE

Posted by Rich Boyer on

In the first two blogs of this series, “CLOUDWAN and the Journey to the Edge Computing World,” I shared my insights on how and why global enterprises are on the path of transitioning from existing all powerful centralized IT infrastructure to a next generation in which decentralization and convergence play a key role. In our […]

Read More

CLOUDWAN: THE CONVERGENCE ENABLING THE NEW WORLD OF NEXT GENERATION INFRASTRUCTURE

Posted by Rich Boyer on

As discussed in the first blog of this series, “CLOUDWAN and the journey to the Edge Computing World,” the network infrastructure of the global enterprise is on a path to decentralization. Convergence is another central theme in the journey to a new generation of IT infrastructure that embraces and enables the Local Edge. That journey […]

Read More

CLOUDWAN at the Mobile World Congress

Posted by Rich Boyer on

Recently, CLOUDWAN exhibited at the NTT R&D forum in Tokyo. This week, the team is  in Barcelona, attending the Mobile World Congress (MWC) where we are showcasing CLOUDWAN. At MWC, you can find us at the NTT / NTT Docomo booth located at Hall 3 Stand 3D31. Throughout the international conference, we are conducting demonstrations […]

Read More

CLOUDWAN: THE TRANSITION FROM EXISTING LEGACY SYSTEMS TO NEXT GENERATION INFRASTRUCTURE

Posted by Rich Boyer on

In today’s enterprise world, we are in the process of virtualizing everything, from servers and applications to data and networks. Yet, we have not changed the way we own and operate all these “things” for decades. We operate our systems pretty much the same way we did in the 2000’s, and for that matter, as […]

Read More

A Security Future for IoT, Part 2

Posted by Rich Boyer on

In A Security Future for IoT, Part 1, I discussed how IoT changes the nature of the security game, and in part 2 of this series, I share insights on how we can make that radical change occur. I believe that we are lacking four key and fundamental foundational areas in our current computing model. […]

Read More

A Security Future for IoT, Part 1

Posted by Rich Boyer on

Like it or not, we are in the age of IoT, which actually started 18 years ago when Kevin Ashton used this term in the title of a presentation he made to P&G. His presentation and reference to IoT could have easily been forgotten, except slowly but surely, we have kept up with his concept […]

Read More

The Converge Information Security Conference Summary and Takeaways: Key Challenges Comprising Information Security

Posted by Rich Boyer on

We must develop a common set of initiatives to address the issues for an industry-wide security manifesto, and as I discussed in my presentation, we must stop tolerating compromises in security. This situation is a costly one, as cyber attacks have cost companies $2 trillion over the last 10 years, and during this time period, we have reportedly spent $500 billion in the global effort to prevent cybercrime.

Read More

NTT Global Threat Intelligence Report 2016 Summary

Posted by Rich Boyer on

Recently, NTT published the Global Threat Intelligence Report 2016 (GTIR). This year’s report focused both on the changes in threat trends and on how security organizations around the world can use the kill chain to help defend the enterprise. Summing up the report, colloquially-speaking –  it is a really messed-up world we live in. As […]

Read More

A Few Agile Thoughts

Posted by Rich Boyer on

Security is not an industry that most people want to be engaged in every day. For most people, getting the job done is burden enough without the overhead of security management. And as a security professional, I spend countless hours working not to be in people’s way. Let’s face it, for many, security is a […]

Read More

More Factors: Multi-Factor Security Authentication is More Than Just Passwords and PINS

Posted by Rich Boyer on

Multi-factor security authentication is not a new concept; we’ve been doing it for centuries. Kings messengers had both a seal from the king and a password. Speakeasy doors had special knocks and code words. Secret societies showed tokens and had known members vouch for identities. Aside from the technology shifts over the years, not much […]

Read More

Get Email Updates

Want to keep learning. Sign up for our e-newsletter. We will never share your email.

Categories

Featured Articles

NTT I3’S FIRST PANEL AT SXSW 2018: EXPLORING NEW WAYS FOR STARTUPS AND BIG COMPANIES TO WORK TOGETHER
CLOUDWAN: OWNING AND OPERATING IN THE NEW WORLD OF NEXT GENERATION INFRASTRUCTURE
CLOUDWAN: THE CONVERGENCE ENABLING THE NEW WORLD OF NEXT GENERATION INFRASTRUCTURE
Exciting News: NTT i³ at SXSW 2018