Today, organizations are outsourcing more and more of their IT applications, systems, and infrastructure, and moving to the cloud. But can their IT leaders...
Author - Dan Blum
currently covers security architecture, cloud computing security, endpoint security, Web/email content filtering, and the cybercrime/threat landscape. He also has a background in identity management and other security technologies. Mr. Blum has written hundreds of research papers or articles and consulted for many Global 1000 companies on key strategic architecture and technology decisions. He has participated in and contributed to industry organizations such as the Cloud Security Alliance (CSA), International Information Integrity Institute (I4), Internal Standards Organization (ISO), National Institute of Standards (NIST), Electronic Authentication Partnership (EAP), Organization for the Advancement of Structured Information Syntaxes (OASIS) and Liberty Alliance. Mr. Blum has co-authored "The E-Mail Frontier," published by Addison-Wesley in 1994, and authored "Understanding Microsoft Active Directory Service," published by Microsoft Press in 2000. He has spoken at Gartner Catalyst, Gartner Security Summit, RSA Security, InfoSecurity Europe, I4 Forum, NIST IDTrust, Open Group Security Practitioners, and many other conferences. He blogs on the Gartner Blog Network.
Prior to his current role, Mr. Blum had four roles during his 19 years at Burton Group: Principal consultant, Rapport Communication, which merged with Burton Group in 1998 Senior VP, principal consultant Senior VP, research director (for the Directory and Security Strategies service) Senior VP, group research director (for the Identity and Privacy Strategies service, and establishing Security and Risk Management Strategies service)