Nissan Security Breach Underscores Password Problem

Earlier this week, Nissan confirmed a network hack that comprised both employee names and encrypted passwords. Nicole Perlroth of the New York Times covered the news, citing the commentary of Nissan spokesperson David Reuter and Shawn Henry, former FBI cyber-cop. Perlroth reported that Nissan tracked the hacks back to an IP address, but according…

How the Cloud Can Assuage IT Challenges of BYOD

Last week, we talked about the some of the challenges associated with the use of consumer mobile devices in business. This week we wanted to dig a little deeper into what exactly these challenges are. In a recent post for TechTarget, Michelle Boisvert outlines where the security risks come into play with BYOD and how they require a strong cloud…

Staffing the Cloud with Skilled Employees

As more and more IT services get shifted to the cloud, the demand for talent becomes an increasingly important issue. In an article for CIO, Meredith Levinson describes the challenges facing CIOs in finding employees. Levinson cites data from Wanted Analytics that found from February 2011 to 2012 there was a 99 percent increase in job ads for IT…

New Devices, New Management

In a recent article for the Wall Street Journal, Shara Tibken addresses enterprise tablet adoption and its impact on IT networks. "Companies everywhere are adopting tablets,” Tibken writes. “Forrester Research Inc. estimates that about 25% of computers used for work globally are tablets and smartphones, not PCs." Rapid — and mass — adoption of…

Simple Jenkins Configuration and Deployment

At Okta, we’ve gone through many iterations of using Jenkins to build and test our software. We use a number of tools to make sure our code works properly, and we like to have Jenkins manage these. The list would be familiar to anyone using the Java environment; PMD, Cobertura, unit and functional tests with JUnit, Selenium tests with testNG, and…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube