Chris J Powell

Free App Friday – Replacing WordPress

This is a topic that I have been flirting with for some time (basically since I started Krispy’s Rants in April of 2011.  While the power of the world’s most popular Content Management Solution (CMS) has served me well through several redesigns and a Web Host switch…a “corruption” of the Database last night is the straw that broke the camel’s back. So where do I start, well this has been my challenge right from the start.  I don’t want to have to learn the nuances of PHP Scripting to be able to function as a Blog but in many ways I am thinking that as someone with some Tech Savvy it is time to branch out and not be a slave to what ever is easiest.  There are lots of great alternatives and one of the things that the future of Krispy’s Rants must be is Open Source…so heading over to Open Source CMS lets me peer into the latest and greatest of what Open Source has to offer. Some ground Rules for my moving forward: Cannot be Ruby or Python … Read more

Data, Data Everywhere – How Do You Protect It All?

It may be the first day of spring here…but it certainly does not look or feel like it with a fresh dusting of snow and temperatures that continue to make me long for sipping cold drinks on a warm beach.  The reality is…spring will come and with that another round of interesting security breaches being reported around the world.  With the General Services Administration in the US, Evernote, LinkedIn and Oracle seems to be doing a weekly critical Security Patch on its Java Product. With breach after breach and patch after patch, what is an IT Professional supposed to do to ensure that the data that is in his charge does not fall victim to the same fate that the daily flood of Data Breaches takes on.  Well there is the option of pitching Cyber Insurance as a way to protect not the data but the company’s reputation and offset the inevitable fines and law suits that come from a breach…I had actually never heard of Cyber Insurance before  but Cyber Data Risk Mangers are there to help…I think…maybe?? In … Read more

The Future of Mobile Device Security

This week I have been promoting two colleagues that were over in Barcelona for the Mobile World Congress but I also had two other good friends off on the West Coast of the United States at the RSA Conference in San Francisco.  James McCloskey and Jessica Ireland focused on the Security of things and I thought it might just be an interesting tie in to connect the dots with a week of Mobility with a little bit of Security. One of the key challenges of the new BYOD world that we live in is the general security of the Data that is being used by these devices that for the most part are out of the control of IT Leaders and their support staff.  Early in the conference, a start up company called Remotium was named as the most innovative and I thought it would be interesting to gain some understanding of how a company that has yet to receive any substantial funding can achieve such an impressive title. The premise of the service provided by Remotium is that the key … Read more

Samsung KNOX – BYOD Savior or Just Another Layer?

Every report and whitepaper that I read tells me that BYOD is here and it is an enormous pain for IT Professionals.  There is not enough time or technology available for them to be able to ensure that the Network is Secure, that the right Apps are being used and that there is not a glut of confidential information walking out the door every night at 5PM just waiting for someone to forget their Smart Phone on the table of a Restaurant. Add to the mix the constant onslaught of new Apps that promise to make the world a better place and a gullible workforce that sees 99 cents as a great investment to make their life better and you have a situation that was designed from the very beginning to make the grown men and women of IT drop to their knees and cry. Then comes Samsung with its massive lead in handset sales (39.6% according to IDC report) and the promise to make everything better with its new KNOX product.  With the real announcement of its capabilities coming … Read more

In Data We Trust – But Who Is Holding That Data?

It is amazing how much trust we place in the holding on to our private data to Private and Public organizations.  In a world that on almost a daily basis there is some form of Data Breach that flings open the door of Privacy and Personal Information I find it interesting that there is any trust in others to keep our data safe. In a recently released study the Ponemon Institute released findings of the Top 20 most trusted companies in the US that hold onto our data in many different ways.  In the Executive Summary of the report titled 2012 Most Trusted Companies for Privacy the n-count was quite impressive in building out the data for this study: More than 100,000 adult-aged consumers were asked to name up to five companies they believe to be the most trusted for protecting the privacy of their personal information. Consumer responses were gathered over a 15-week period concluding in December 2012 and resulted in a final sample of 6,704 respondents who, on average, provided 5.4 discernible company ratings that represent 25 different … Read more

I have Lots of Devices…is the World Ready for Me to BYOD?

In my ever changing day I will read anywhere from 50-150 web articles in any given day.  Much of the time this will lead me down a rabbit hole or two and have me dive into several White Papers or other linked materials that strike my interest.  One that did just that was an article from read write enterprise titled “What Does a Typical BYOD Program Really Look Like?”  Any time a website includes some interesting data points and conducts a survey it seems to get my attention and makes me focus a little more on the content. The world of BYOD is something that my customers come to me with almost every day.  It doesn’t matter if they are a small School District in Alabama or a Multinational Corporation Headquartered in Belgium…the question is the same…What is the right way to do BYOD that does not make me less secure? Security more than anything else seems to be the biggest concern for IT Professionals that are either proactively addressing the BYOD challenge or are being mandated by the business … Read more

Mesh Computing – A Tactical Cloud?

There has been talk of the future of Mesh Computing for a while and I have just fluffed it off a bit as something interesting but not really something that should be looked at deeper.  As reading a short article over at and with the talk of “Tactical Cloud Computing” being planned by the US Army  I got thinking about that wonderful promise about how Mesh Computing will change the world and decided to take a deeper look.

Read moreMesh Computing – A Tactical Cloud?

IT Ethics – Extending Risk Management to People

I have been looking at Risk Management a lot lately and I realized that I have not looked at the people of IT in quite some time.  Technology is wonderful, it is right and wrong, on and off, 1 and 0 but that same level of simplicity does not apply to people and when looking at Risk Management it is rarely an exercise in just looking at technology it has to be about the people too.  The ethics of an organization and of the people who staff that organization is an often overlooked aspect of the organization and today I will look at IT Ethics.

Read moreIT Ethics – Extending Risk Management to People