Description: In 2008, the average number of security breaches increased slightly from previous years. Although the number of security breaches remained moderate over the last few years, the data indicates the severity levels have increased. This suggests many organizations have made significant progress in dealing with security issues, but the number and types of threats have increased in step. The most significant costs of security breaches remains the overall impact on employee productivity. About one-third of U.S. respondents cite lost productivity as the top consequence of a breach, followed by a disruption of revenue-generating activities. The primary cause for the most severe security breaches remains unintentional in nature and typically caused by human error. This demonstrates a need for more employee trainings and deeper knowledge of technology functions.
Description: Yahoo was under attack, the first of several in one week that would dramatically expose cyberspace’s dirty secret: though the Internet is an amazing creation that has boosted our economy and provided lots of cheeky Super Bowl ads, it is still a work in progress that can be knocked silly with surprising ease. Even the e-commerce giants are no sturdier than any others. All it takes is a well-directed “denial of service” attack to blow away the edifices, at least on a temporary basis. And when you try to track the culprit, it turns out that all you can find is a shield–the dummy computers through which the cyber vandal laundered his poisonous computer code.
Description: 7:36 minutes. YouTube video about the “governance,” or management, of information. Many companies govern “money, finances, risks.” This video presents argument about need for special, specific, different attention to the importance of controlling these assets; a context for what needs to be done.
Description: Whitepaper from IT Governance Institute, providing a discussion of IT governance trends by a panel of experts. The IT Governance Institute (ITGI) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. ITGI developed Control Objectives for Information and related Technology (COBIT), now in its fourth edition, and Val IT, and offers original research and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities.
Description: Considered one of the largest grid computing projects in the world, J.P. Morgan Chase Investment Bank’s pioneering effort to combine seven separate financial risk management systems to share computing power is on target to lower costs while increasing flexibility and service to internal customers. Grid computing provides communication among devices. Coordinates use of large number of servers & storage, acting as one computer by sharing & coalescing the computing power.
Description: Green computing is a mindset that asks how we can satisfy growing demand for network computing without putting undo stress on the environment.
Data centers are commonly filled with large numbers of servers that require a tremendous amount of time and money to maintain. Dan Chu of VMware shows how virtualization can optimize fewer servers to run at higher performance levels.