Thursday, January 31, 2008

ISO - News

Discussions at the recent World Economic Conference in Davos Switzerland focussed heavily on the need for coordinated responses to the worlds major issues, such as the climate, security and nutrition. There was much discussion about the idea of collaborative innovation as a reasonable response to these issues. Indeed, collaborative innovation has been experiencing a rise in use for the past few years, through collaborative commerce, as so named by the Gartner Group, or through the Wiki-World of Don Tapscott. Companies are tapping into the potential of collaborative innovation as means to work towards their own prosperity and survival, by involving customers, suppliers and even competitors. Collaborative innovation has major implications for systems security and for IS Assurance. In order for collaboration to work well, the collaborators must be tied together through their systems. We have been seeing this and will see much more of it in the future. The ISO has been setting some standards that are relevant. The IS Assurance world needs to be involved as well. ISO - News

Tuesday, January 29, 2008

The Top Ten Risks for Business in 2008 - Strategic Business Risk - AABS - Ernst & Young

Ernst & Young has released a report that lists the top ten risks facing business. The report, released after a massive research effort, lists regulatory and compliance risk as the greatest risk. This will be no surprise to those numerous executives who have struggled to comply with the demands of Sarbanes-Oxley and, in Canada, both SOX and the similar CSA rules. It has been a huge drain on corporate resources, which some say has been a case of overkill. It has, however, focused management on systems, and led to many systems improvements, which has been a good thing. Risk - AABS - Ernst & Young

Friday, January 25, 2008

Enterprise Infrastructure > Systems Management > Don’t confuse POS with QOS

Quality of Service deals with a variety if issues, including network congestion. It is an area of increasing importance in systems management as are all quality issues. But QOS means different things to different people. This article sets out some of the concepts in use. Enterprise Infrastructure > Systems Management > Don’t confuse POS with QOS

Thursday, January 24, 2008

New Developments

Late last fall, the FTC released three new reports dealing with identity theft. With more than 8 million US residents the victim of identity theft in 2006, it is a serious and growing problem. Of the three reports, one of them identifies red flags that should be watched for in determining whether identity theft is occurring. New Developments

Monday, January 21, 2008

TMT Security Survey 2007 - Technology, Media & Telecommunications - TMT - Security - Deloitte Touche Tohmatsu

Deloitte Touche Tohmatsu recently released its 2007 comprehensive survey of security and risk elements in over 100 technology, media and telecommunications companies worldwide. The survey covers a wide array of issues, ranging from digital rights management to the role of security officers to security governance generally. The study points to several areas to which attention needs to be paid. TMT Security Survey 2007 - Technology, Media & Telecommunications - TMT - Security - Deloitte Touche Tohmatsu

Thursday, January 17, 2008

European Journal of Information Systems - Table of Contents

The European Journal of Information Systems released an issue for December, 2007 in the area of Healthcare Information Systems Research. Most of the papers and articles are available for free download. They include one on RFID and several other vry relevant studies. European Journal of Information Systems - Table of Contents

Monday, January 14, 2008

Enterprise Wireless LAN Security & WLAN Monitoring

In November, AirDefense conducted a survey of 3000 retail outlets in New York City and found that 81% of the devices they encountered could be compromised through wireless networks that were not encrypted. Wireless remains a major hole in the security of systems, not through any defect in the wireless systems themselves, but rather through a defect in the thinking of their owners. Enterprise Wireless LAN Security & WLAN Monitoring

Friday, January 11, 2008

E-Commerce News: BPM & BPO: Keys to BPO Success: Accountability, Monitoring

The Aberdeen Group has released a survey of 170 Companies that have outsourced their Business Process Activities to Global BPO Service Providers and have drawn some interesting conclusions as to the reasons for their success. The reasons range from keeping costs low to better accountability. This article provides a summary and it is interesting reading. E-Commerce News: BPM & BPO: Keys to BPO Success: Accountability, Monitoring

Wednesday, January 9, 2008

Five steps to evaluating business continuity services

Many organizations have been outsourcing their business continuity needs. This article sets out five key considerations in evaluating service providers in this area along with a host of other valid points to consider. Five steps to evaluating business continuity services

Tuesday, January 8, 2008

E-Commerce News: Enterprise IT: Mobile Devices: Sitting Ducks for Hackers

Smart phones are increasingly being used for business purposes, even those that were not intended for more than casual personal use. They often have capabilities like business type applications and wi-fi connectivity, all of which makes them a security nightmare, one that promises to keep on going indefinitely. E-Commerce News: Enterprise IT: Mobile Devices: Sitting Ducks for Hackers

Friday, January 4, 2008

IBM Systems Journal | Vol. 46, No. 4, 2007 - IT-Enabled Business Transformation

The latest issue of the IBM Systems Journal sets out some innovative programs being used in IBM, including the implementation of SOA, voice reognition is applications and a collaborative innovation program. All areas that are top priority for many companies these days. IBM Systems Journal Vol. 46, No. 4, 2007 - IT-Enabled Business Transformation

Thursday, January 3, 2008

globeandmail.com: Record data breaches in 2007, groups say

Several interest groups have reported that 2007 was a record year in the breach of private information. They say that companies are reacting, rather than being proactive, to these events. While security is being increased, hackers are staying ahead of the game and exploiting any new vulnerabilities in systems, such as those evident in some wireless systems, which are proliferating. globeandmail.com: Record data breaches in 2007, groups say