John McNulty

Two-Factor Authentication Still Strong

Bruce Schneier, a highly respected security expert, recently wrote an essay titled "The Failure of Two-Factor Authentication." Schneiers article has stimulated a lively debate in the banking IT security...

Latest Posts

How CIOs Measure Themselves and Why it Matters

Over the last several years, I have asked CIOs multiple times about how they would like their performance to be measured. One answer has...

Why Cloud Means Cloud-Native

“Only when the tide goes out do you discover who's been swimming naked.” -- Warren Buffett The most important change in computing over the past...

Top Cloud Service Providers & Companies

Cloud computing providers play a foundational role for businesses. Virtually every enterprise uses cloud computing in some manner, whether it’s to deliver key infrastructure...

The Role of Data Governance in Effective Data Management

I spoke with four industry experts about the growing challenges in data governance, spotlighting which issues need to be resolved for better data management. The...

Edge Data Fabric: What It Is, Why It Matters

To generate richer and more timely insights, enterprises are using increasing amounts of data. Expect that trend to continue. An IDC model projects that...