In 2009, FedEx assessed its application portfolio and realized it had more than 2,600 applications, and more than 14,000 custom interfaces to these applications. Can you have too many? Here’s why, what the risks are and what to do about it.
The changing of the software model from shrink-wrap to cloud brought security from an afterthought to the forefront. Here we dive into on three specific areas: confidentiality, integrity and availability.
Because your company has probably moved to the cloud, there are some things you are going to worry about, but shouldn’t: the cloud operator stealing your data at rest, bad actors intercepting and reading your data in flight, bad actors “hacking the cloud” and stealing everything. When you eliminate these things, then you get back to the things that really matter.