Snowden, Security & Privacy
In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]
In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]
You’ve decided you need to set up an Information Security group in your IT department, or perhaps you already have one but it is not performing to your expectations. One [...]
As IT Leaders, we must be able to understand the risks we face, and how to address them. Understanding and managing your IT risks by categorizing them and then rating [...]
For a number of years now, IT has been confronted with what is known as the consumerization of IT. We used to have complete control: “you can’t have that”; “you [...]
Balancing IT Activities In IT, we all know that a certain amount of resources must be assigned for upgrades, updates, patches and scheduled maintenance. In general, this is known as [...]
Many of the large IT research organizations and others have been telling us for some time the importance of IT alignment with the business and its objectives. Many attempts at [...]
As a senior IT Manager in a prominent Canadian municipality, I wrote and reviewed numerous RFPs and responses. Let’s just say that some are better than others. Some responses are [...]
Incomplete or changing requirements may be the result of inadequate scope definition, which can effect IT project success. In one of my previous blogs, I discussed the importance of “Scope [...]