Serverless Automation: Services as Code (SaC)

November 12, 2017

Serverless architects will design holistic Services on Demand (SoD) solutions using Services as Code (SaC) to configure secured managed services for code, events, and data.

Wayne Scarano - Serverless Global Architect

Prepare for the Next Disruptive Waves: Serverless & InterCloud

July 12, 2016

On-demand serverless compute, Function as a Service (FaaS), combined with existing cloud services allows the cloud itself to become programmable. Specifically, cloud services are the components for building customer applications. First, developers will program cloud services for a given cloud provider. Next, cloud providers will open their services and allow intercloud communications yielding intercloud services. Ultimately, architects and programmers will design and program the intercloud using InterCloud as a Service (ICaaS).

2021 Predictions
o PaaS usage will exceed IaaS
o Serverless/Microservice/API architectures will standardize and evolve into InterCloud as a Service (ICaaS)
o Cloud/InterCloud Architecture role will supplant DevOps role (think LessOps)

The IoT Shadow Trust Framework (IoTSTF)

January 6, 2016

The Internet of Things (IoT) shadow model is disrupting the design, development, maintenance, quality, and support of the devices they mirror. Next, IoT shadows will disrupt how we secure these devices as an integral part of the device lifecycle, incorporating the concept of security by design. The use of IoT shadows in the security domain is the foundation of The IoT Shadow Trust Framework (IoTSTF).

Is Your Internet Of Things (IoT) Trustworthy?

December 23, 2015

The Internet of Things (IoT) is undergoing major transformations, shifting to autonomous (intelligent) operations across a connected mesh of devices with data aggregations and control at a global level (e.g., cloud computing platform with big data analytics). The merging of the networked physical and cyber components also requires the merging of various disciplines to properly evaluate risk and achieve required levels of security, privacy, and situational awareness. This is a far greater challenge than many organizations may anticipate.

Security by Design

October 20, 2015

Security is the responsibility of the entire organization including employees and third parties. It should be part of an organization’s DNA with every action having a security consideration.

Digital Security Posture – A Competitive Advantage

October 1, 2015

The digital world is changing rapidly – organizations are embracing the cloud, mobile is ubiquitous, social media are enhancing communications, and the Internet of Things (IoT) is proliferating. An updated approach is needed to manage an organization’s cybersecurity posture – a digital security posture.

SGA Cyber Security Forms Strategic Emerging Technology Alliances

September 3, 2015

"Organizations should strive to achieve and maintain a baseline cybersecurity posture, driven by business needs and risk tolerance with a balance of people, technology, and processes," said Wayne Scarano, Chief Executive Officer at SGA Cyber Security, Inc. "As business needs drive the demand for new technological solutions, organizations need to ensure critical data are secure. We are proud and excited to partner with the best established and emerging providers in the industry."

To Top