Mike Walker Publishing on CIO.com and HP Discover Performance Blogs

Mike The Architect Blog: Mike Walker Publishing on CIO.com

Some of you may of noticed from a few of my tweets recently that my posts were coming from a few different sources. This wasn’t a mistake or a “fake” Mike Walker running around but a deliberate approach to my publishing.

After a lot of thought and consideration I decided that I have been covering a broad range of topics on www.MikeTheArchitect.com with topics ranging from the discipline of Enterprise Architecture, executive level content and even some Solution Architecture. Some of which is good and in alignment with the core EA topics of www.MikeTheArchitect.com but others a bit broader and loose in alignment. This is combined with my broad range of interests and activities as a strategic advisor that exposes me to a wide range of experiences and insights that I like to share with all of you. 

To make my content a bit more digestible and tailored to you I want publish to the appropriate sites so you get what you need.  As a result I will be publishing on these three sites:


Mike The Architect Blog: Mike Walker

Mike The Architect

I will continue publishing to “Mike The Architect” with Enterprise Architecture proven practices, guidance, news and insights.


Mike The Architect Blog: Mike Walker Publishing on CIO.com

CIO.com Enterprise Forum (http://www.enterprisecioforum.com/en/blogs/mikejwalker)

I plan on publishing content suited for CxO’s, executives and other business leaders here.


Mike The Architect Blog: Mike Walker Publishing on HP Discover Performance

HP Performance Discover Blog(http://h30499.www3.hp.com/t5/user/viewprofilepage/user-id/1414875)

This will be a resource for IT leaders looking for strategic insights and best practices to define, measure and achieve better performance.



iCloud users take note: Apple two-step protection won’t protect your data

A diagram showing how Apple's two-step verification works.

If you think your pictures, contacts, and other data are protected by the two-step verification protection Apple added to its iCloud service in March, think again. According to security researchers in Moscow, the measure helps prevent fraudulent purchases made with your Apple ID but does nothing to augment the security of files you store.

To be clear, iCloud data is still secure so long as the password locking it down is strong and remains secret. But in the event that your account credentials are compromised—which is precisely the eventuality Apple's two-factor verification is intended to protect against—there's nothing stopping an adversary from accessing data stored in your iCloud account. Researchers at ElcomSoft—a developer of sophisticated software for cracking passwords—made this assessment in a blog post published Thursday.

"In its current implementation, Apple’s two-factor authentication does not prevent anyone from restoring an iOS backup onto a new (not trusted) device," ElcomSoft CEO Vladimir Katalov wrote. "In addition, and this is much more of an issue, Apple’s implementation does not apply to iCloud backups, allowing anyone and everyone knowing the user’s Apple ID and password to download and access information stored in the iCloud. This is easy to verify; simply log in to your iCloud account, and you’ll have full information to everything stored there without being requested any additional logon information."

Read 11 remaining paragraphs | Comments