Powershell Security Model: Script Security Officer, Part 2

In the first post in this series, we explored the security need for an IT professional to identify who the author of a piece of code (like a PowerShell script) is. The challenge with that is producing evidence of the identity of the author that’s formatted in a way that the consumer of that script can use it.

That interaction is somewhat like the interaction between a speeder and a police officer. The officer needs to prove the identity of the driver in much the same way that an IT pro needs to identify a scripter. The officer can ask for a driver’s license, but what can an IT Pro ask for?

Read more

Cloud Computing Success Factors from CIOs

The 2013 CIO Executive Forum in Charlotte, NC was a great event. Seldom do you get to rub elbows with top company C-Level executives, and less often do you get to hear what they really think about the most pressing matters in IT today.

Cloud computing was the over riding theme of almost every presentation and discussion. I can paraphrase the cloud conversations pretty simply, “It’s not a question of if, but rather how to adopt cloud successfully.”

Read more

The Sum of its Parts Understanding the True Value of Accounting Certifications

According to a recent Manpower Group survey, in the last two years accounting and finance jobs were the fifth hardest positions to fill in the U.S. This is not surprising. Highly specialized fields, like accounting, provide many challenges for human resource executives who do not come from accounting backgrounds. As a result, many struggle to match a candidate’s qualifications and skills with the requirements of open positions.

Read more