Author: John Burke

It's not nuclear weaponry, but for an enterprise developing a critical application that will handle sensitive data, application developed in-house can create existential-level institutional peril. No One Plans To Leave Gaping Security Holes ...

With the balance of enterprise IT shifted to cloud now (remember, the majority of enterprise IT workloads now run in an external cloud environment) IT teams need to really embrace cloud-first thinking. They won't be able to build a real blueprint for the next few...

When we look at IT's ability to deliver services from the cloud, a few tools stood out as associated with high degrees of success, as measured by ability to restore services quickly when trouble arises (and trouble always arises). At the top is the cloud...

Edge computing is vital not just to the burgeoning world of real-time responsive IoT, but to enterprise network security, as these IoT systems multiply and spread. Edge computing creates a distributed infrastructure with centralized management and lights-out -- or remote -- operations built on private cloud infrastructure. Edge...

As enterprises begin to embrace the idea of edge computing, all evaluations should begin with use cases. After all, the only reason to deploy resources on or near a remote location, as opposed to in a data center or in the cloud, is to meet stringent,...

Edge computing focuses on putting compute and storage resources outside the enterprise data center, in or near branches. But edge computing, propelled by IoT and poised to grow with the spread 5G services, is not traditional decentralized computing. CIOs need to understand what drives an edge computing strategy in order...

In the past few years, there has been an explosion of cloud service offerings to match the wide variety of industry cloud infrastructure needs. Today, the average enterprise uses external clouds to deliver more than 56% of its workloads. Plus, nearly all organizations operate multi-cloud...

According to Nemertes' Cloud and Cybersecurity 2019-2020 Research Study, 2019 was the year the average enterprise for the first time found more than half its IT workloads running outside the data center. This ongoing shift of enterprise IT work into cloud environments -- whether SaaS,...

The ultimate end state of software-defined network security is what we at Nemertes Research call deep segmentation. The term refers to the ability to finely control what entities can see, who they communicate with and how they do this, end to end across the enterprise network. With...

Almost since the inception of the commercial Internet, security compromises exploiting the ability to hijack dynamic code content have plagued us.  I think cross-site scripting, a form of client-side attack, has been on OWASP's annual top 10 web security threat list since the list's creation. ...

Ramping up Risk, pre-COVID-19 and mid-COVID-19 Enterprise organizations pour hundreds of millions into their cybersecurity initiatives, protecting  everything from remote and cloud-based resources to IoT devices to collaboration applications. At the same time, they're also transforming interactions with their employees and customers. They're increasingly enabling employees to...

Where the Work Is Nemertes documented last year as the first year in which the majority of enterprise workloads ran in external cloud environments, with 27% in SaaS and 29% now in IaaS. While these migrations tend to be one-way, out of the data center and into...