Serverless Automation: Services as Code (SaC)

November 12, 2017

Serverless architects will design holistic Services on Demand (SoD) solutions using Services as Code (SaC) to configure secured managed services for code, events, and data.

Wayne Scarano - Serverless Global Architect

From Serverless to InterCloud

November 2, 2016

Serverless is a misnomer because there are servers. We will discuss what Serverless is, how it is part of an evolving abstraction, and what's on the horizon - InterCloud.

Wayne Scarano - Serverless Global Architect

Serverless IoT with AWS Lambda

November 2, 2016

Serverless IoT with AWS Lambda - Walkthru, Enterprise Implications

Bob Balaban, Serverless Global Architect

Serverless Defined

October 28, 2016

Serverless, the abstraction of Infrastructure as a Service (IaaS), is being embraced by cloud providers and developers, from startups to large corporations (e.g., Capital One, NetFlix, Comcast).

Serverless is Cloud 2.0. What is needed is a common understanding, a frame of reference — a definition.

Serverless === Function as a Service (FaaS)

An on-demand scalable compute service,
running a small stateless function,
triggered by an event,
billed only for resources used,
operating on abstracted servers.

Prepare for the Next Disruptive Waves: Serverless & InterCloud

July 12, 2016

On-demand serverless compute, Function as a Service (FaaS), combined with existing cloud services allows the cloud itself to become programmable. Specifically, cloud services are the components for building customer applications. First, developers will program cloud services for a given cloud provider. Next, cloud providers will open their services and allow intercloud communications yielding intercloud services. Ultimately, architects and programmers will design and program the intercloud using InterCloud as a Service (ICaaS).

2021 Predictions
o PaaS usage will exceed IaaS
o Serverless/Microservice/API architectures will standardize and evolve into InterCloud as a Service (ICaaS)
o Cloud/InterCloud Architecture role will supplant DevOps role (think LessOps)

CPS PWG Cyber-Physical Systems (CPS) Framework Release 1.0

May 2016

NIST has released version 1.0. Please use as a replacement for the draft in these whitepapers:

06-Jan-2016 The IoT Shadow Trust Framework (IoTSTF)
23-Dec-2015 Is Your Internet Of Things (IoT) Trustworthy?

The IoT Shadow Trust Framework (IoTSTF)

January 6, 2016

The Internet of Things (IoT) shadow model is disrupting the design, development, maintenance, quality, and support of the devices they mirror. Next, IoT shadows will disrupt how we secure these devices as an integral part of the device lifecycle, incorporating the concept of security by design. The use of IoT shadows in the security domain is the foundation of The IoT Shadow Trust Framework (IoTSTF).

Is Your Internet Of Things (IoT) Trustworthy?

December 23, 2015

The Internet of Things (IoT) is undergoing major transformations, shifting to autonomous (intelligent) operations across a connected mesh of devices with data aggregations and control at a global level (e.g., cloud computing platform with big data analytics). The merging of the networked physical and cyber components also requires the merging of various disciplines to properly evaluate risk and achieve required levels of security, privacy, and situational awareness. This is a far greater challenge than many organizations may anticipate.

Security by Design

October 20, 2015

Security is the responsibility of the entire organization including employees and third parties. It should be part of an organization’s DNA with every action having a security consideration.

Digital Security Posture – A Competitive Advantage

October 1, 2015

The digital world is changing rapidly – organizations are embracing the cloud, mobile is ubiquitous, social media are enhancing communications, and the Internet of Things (IoT) is proliferating. An updated approach is needed to manage an organization’s cybersecurity posture – a digital security posture.

SGA Cyber Security Forms Strategic Emerging Technology Alliances

September 3, 2015

"Organizations should strive to achieve and maintain a baseline cybersecurity posture, driven by business needs and risk tolerance with a balance of people, technology, and processes," said Wayne Scarano, Chief Executive Officer at SGA Cyber Security, Inc. "As business needs drive the demand for new technological solutions, organizations need to ensure critical data are secure. We are proud and excited to partner with the best established and emerging providers in the industry."

To Top