Author Archives: Kim Hildebrand

How to Protect Your Intellectual Property in the Cloud

How to Protect Your Intellectual Property in the Cloud by Stephanie Overby

The main focus of this article is how to protect user intellectual property online. Cloud users and businesses do not always recognize how much their intellectual property is at risk on the cloud. For businesses, this sometimes requires, at a great expense, moving formulas and files back to in-house data storage. Being online, there is always a risk when intellectual property and sensitive data is released in the cloud, and that risk increases when a third party is involved or when internet based services are brought into the equation. Threats from these two problems make it more difficult to know and follow where data is and who is accessing it. Data on the cloud can bounce from country to country where intellectual property laws are not necessarily consistent. The article then outlines nine steps to follow to protect user intellectual property. The nine steps are as follows:

1)      Pick the right internet provider.

2)      Select the right service.

3)      Read the fine print. Add some fine print of your own.

4)      Expect to pay more.

5)      Consider IP creation.

6)      Secure it yourself.

7)      Prevent a lockout.

8)      Revisit controls on a regular basis.

9)      Be prepared to walk.

The ninth step infers the option that cloud based services may not be appropriate for every user or every business.

 

I chose this article because it gave possible threats and steps to protecting intellectual identity on the cloud. Though Stephanie Overby is a writer, she covers topics in IT Outsourcing for CIO, a technology professional journal.

Cloud Security: Will Your Business Data Be Safe In the Cloud?

Cloud Security: Will Your Business Data Be Safe In the Cloud? By Todd Weiss

This article’s main focus is to reveal how businesses can protect their intellectual property in the cloud. In today’s world, it is almost impossible not to have information online, but businesses such as medical centers, insurance agencies, and financial companies struggle to keep sensitive data private. These poses a large problem for data security, as hackers can gain access to personal information, then turn around and ‘sell’ that information. The article suggests that setting clear policies on access to both user and location is quite possibly the best move that a company can take to protect their information as well as their clients’ information. Although the author and a tech consultant of an IT consultancy, Ara Trembly says, “that inherit risk is not something I advise clients to take if they are in a business that is data dependent.” The article lists a few questions for a company to consider before establishing user access and placing data online.

I chose this article because it gave a perspective of how intellectual property through businesses can be a greater risk without users necessarily knowing. Though Todd Weiss is a writer, he covers topics such as Cloud computing, CRM, and Enterprise applications for CIO, a technology professional journal.

 

Tech Industry Leaders Appeal for Laxer Intellectual Property Laws

Tech Industry Leaders Appeal for Laxer Intellectual Property Laws by Kenneth Corbin

An appeal to the House of Representatives lawmakers from tech industry executives to relax intellectual property laws for the benefit of companies is the main focus of this article. The main problem proposed by these executives is patent rules and restrictions on the innovation of technology. These executives requested to rewrite Intellectual Property laws, such that the rate of innovation can be increased while also taking into account antipiracy struggles. Companies hacking competitors can find files and blue prints and other forms of intellectual property, while patents are becoming a thing of the past. According to Nathan Seidle, CEO of SparkFun Electronics, comments “Innovation moves faster than the shield of intellectual property…time is better spent innovating.”

 

I chose this article because it gave a different perspective to intellectual property as being technology innovations and corporations. Though Kenneth Corbin is a journalist, he often reports on government and regulatory issues for CIO, a technology professional journal.

Digital Identities Could Help to Improve Enterprise BYOD

Digital Identities Could Help to Improve Enterprise BYOD by Bob Tarzey

This article discusses how risks can be eliminated by using individual digital identities of employees. These risks rise due to the fact that employees are allowed to use their own devices and apps. Apps and websites, such as Facebook and Google allow the same credentials which allows users less of a hassle to remember passwords and usernames for different sites, and some even log in users automatically. A question which can be asked is, if the employee or person logging in with a certain identity is that user the owner of the identity? At the moment, the only authorization that the user and identity match is on the original site or app. This problem with personal credentials then crosses into issues within businesses and the government and their employees. Despite these authenticity problems, unified identity and management systems allows easier to implement single sign on systems (SSO). SSO provides a solution to the business end of multiple user names.

 

I chose this article for digital identity because it discussed individual digital identities through use of bring your own device and repeated user credentials, and how verification of those digital identities can be harmful to businesses. Though it is in a news article, the source is ISC Squared, the endorser/provider of the CISSP (Certified Information Systems Security Professional) Certification.

 

The Need for Identification

The Need for Identification by Polly Traylor

This article discusses how identity management is changing with the use of mobile technologies and the need to create and implement a system that takes care of misuse and breaches in identity management. Digital Identity is protecting information that people and businesses only want certain people to have. The need for identity management is increasing because of the increase in sharing information as well as an increase in mobile workforce. Because of this, there are several factors that need to be taken into account. For example, locations and networks cannot always be trusted which leaves networks to rely on user IDs. Multiple user ID’s are another challenge to take into account when different access and passwords are needed which can also be unreliable. The need for more identity management is growing; however it is only implemented in about 30 to 40 percent of large companies today. Identity management is expensive and takes time to be placed into effect. According to Bob West, it can take a minimum of “three to five years”. Developing a simple means for identity management has become a top priority today, but requires many tools, policies, the appropriate stakeholders, combining exiting policies, and maintaining user privacy. The article suggests that it would be easiest and best if the internet could just take care of the problem in general by using common ID frameworks, which would save time and money. However, the industry has not yet developed a solution.

 

I chose this article because it discussed how there is a need for better identity management online. The approach this article took looks at the problem as a whole including tools, policies, and user privacy. I think it was very interesting and suggested a decent option to increase security and identity management. Though it is in a news article, the source is ISC Squared, the endorser/provider of the CISSP (Certified Information Systems Security Professional) Certification.

 

Securing the Cloud: Protecting Cloud-Based IP Through Identity and Access Management

Securing the Cloud: Protecting Cloud-Based IP Through Identity and Access Management by Kurt Johnson

This article offers one option to helping establish identity management online. The suggestion this article offers is using predictive analytics to close the gap between controlling identity management and not controlling identity management and access. Identity management gets increasingly more complex because of online and internet use.  It shifts the tasks away from being inside business boundaries to being out in the open.  For example, risk increases with the internet using public networks, attracting hackers, and so forth. Predictive analysis is done by identifying trends and what people are doing to access and share information. This method would work well because there are so many applications and information sharing occurring online that there is an added complexity and risk of security breaches. This approach allows businesses to first understand risks by examining information sharing resources or programs and then predicting user activity so that access can be better and more easily controlled. This approach allows businesses to focus on its users, and their activity, to approach the challenges associated with digital identity and intellectual property.

 

I chose this article because it discussed how there is a need for better identity management online. This article offered a solution that involves focusing on following and predicting user activity as a starting point to ultimately accomplish better management. Though it is in a news article, the source is ISC Squared, the endorser/provider of the CISSP (Certified Information Systems Security Professional) Certification.

Digital Identity Articles

Summary #1: Securing the Cloud: Protecting Cloud-Based IP Through Identity and Access Management by Kurt Johnson

This article offers one option to helping establish identity management online. The suggestion this article offers is using predictive analytics to close the gap between controlling identity management and not controlling identity management and access. Identity management gets increasingly more complex because of online and internet use.  It shifts the tasks away from being inside business boundaries to being out in the open.  For example, risk increases with the internet using public networks, attracting hackers, and so forth. Predictive analysis is done by identifying trends and what people are doing to access and share information. This method would work well because there are so many applications and information sharing occurring online that there is an added complexity and risk of security breaches. This approach allows businesses to first understand risks by examining information sharing resources or programs and then predicting user activity so that access can be better and more easily controlled. This approach allows businesses to focus on its users, and their activity, to approach the challenges associated with digital identity and intellectual property.

 

Summary #2: The Need for Identification by Polly Traylor

This article discusses how identity management is changing with the use of mobile technologies and the need to create and implement a system that takes care of misuse and breaches in identity management. Digital Identity is protecting information that people and businesses only want certain people to have. The need for identity management is increasing because of the increase in sharing information as well as an increase in mobile workforce. Because of this, there are several factors that need to be taken into account. For example, locations and networks cannot always be trusted which leaves networks to rely on user IDs. Multiple user ID’s are another challenge to take into account when different access and passwords are needed which can also be unreliable. The need for more identity management is growing; however it is only implemented in about 30 to 40 percent of large companies today. Identity management is expensive and takes time to be placed into effect. According to Bob West, it can take a minimum of “three to five years”. Developing a simple means for identity management has become a top priority today, but requires many tools, policies, the appropriate stakeholders, combining exiting policies, and maintaining user privacy. The article suggests that it would be easiest and best if the internet could just take care of the problem in general by using common ID frameworks, which would save time and money. However, the industry has not yet developed a solution.

 

I chose these two articles because they both discussed how there is a need for better identity management online. Each article took a different approach as to how that should be accomplished. The first article offered focusing on following and predicting user activity as a starting point to ultimately accomplish better management. The second article on the other hand looks at the problem as a whole including tools, policies, and user privacy. I think both articles were very interesting and suggested two different but decent options to increase security and identity management.