October 08, 2013

KPMG’s analysis of third-party integrity risks
KPMG’s Astrus Insights, which analyzes some 8,000 integrity due diligence reports on third party relationships, covering 172 countries, has found that the Financial Services sector is the most exposed of any industry to the threats of fraud, corruption, insider trading, negligence and bankruptcy. Additionally, the analysis has shown that third party risks have an impact across many sectors with bribery and corruption identified as a key risk.


Microsoft enables CodePlex projects to use GPLv3 license
GPLv3 is now one of the license choices that CodePlex developers see in a drop-down list offering them licensing choices. Other options in the drop-down include Apache 2.0, Simplified BSD, GPLv2, Mozilla Public License 2 and a handful of Microsoft open-source licenses. Individuals interested in hosting an open source project on CodePlex need to select a license at the time they first put their projects on the site.


Big Data: How Can We Measure the Risks?
The chief risk factor surrounding big data is not knowing the potential future downsides associated with your failure to manage it all effectively. Making the risk factors transparent for all of your big-data sets—unstructured, structured and all gray areas in between—should be a top business priority. The above-referenced article presents a rigorous approach for modeling and measuring the risks associated with unstructured data.


Eleven Secrets of SaaS Product Design
This is the fifth and final post in a series that explores SaaS marketing strategies that drive growth throughout the customer lifecycle using the three fundamental SaaS growth levers: customer acquisition, customer lifetime value and customer network effects. In the course of this exploration, we’ve encountered numerous examples where the SaaS product itself is the instrument of growth. This final installment explores the product P in more detail providing Eleven Secrets of SaaS Product Design that drive growth at each stage of the customer lifecycle.


The Post-PC era will be the best of times for security and the worst of times for security vendors
Hardware security can make a device tens of thousands of times more secure than today’s PCs. For example, use of a Trusted Platform Module (TPM) (required by Windows 8) allows a device to securely attest to its own integrity when it powers on. In addition, CPU features for hardware isolation can allow the system to securely hardware-isolate the execution of untrusted code. The use of strong encryption for all data at rest means that a lost device need not result in a loss to the enterprise.


Gartner Identifies the Top 10 Strategic Technology Trends for 2014
“We have identified the top 10 technologies that companies should factor into their strategic planning processes,” said David Cearley. “This does not necessarily mean adoption and investment in all of the listed technologies, but companies should look to make deliberate decisions about them during the next two years.” Mr. Cearley said that the Nexus of Forces, the convergence of four powerful forces: social, mobile, cloud and information, continues to drive change and create new opportunities...


Hosting provider LeaseWeb falls victim to DNS hijacking
"Our security investigation so far shows that no domains other than leaseweb.com were accessed and changed," LeaseWeb said in a blog post Sunday after resolving the issue. "No internal systems were compromised. One of the security measures we have in place is to store customer data separately from any publicly accessible servers; we have no indication that customer data was compromised as a result of this DNS hijack."


Identifying and locking down known Java security vulnerabilities
Websense Security Labs showed that 94% of endpoints currently running Java contain at least one known vulnerability. First, is there an easy way for organizations to determine the security vulnerabilities in the Java versions they are running? Also, how can organizations further secure old versions of Java if they can't upgrade in a timely fashion?


Handbook: Architecting an Agile Enterprise
This white paper takes an in-depth look at the relationship between Agile business practices and mobile computing. Inside, learn more about the balancing act many modern businesses face when trying to provide a quick turnaround for mobile applications on a limited budget.


Open Agile Adoption: The Executive Summary
The core concept of OAA is the passage rite or “rite of passage”. A passage rite is a cultural event (and a kind of social game) that helps people make sense of complex transitions. Agile adoptions are complex transitions. These are the key events in the passage rite: A Beginning: An Open Space meeting; The Middle: With experimentation, play, and storytelling; and The End: An Open Space meeting



Quote for the day:

"When people talk, listen completely. Most people never listen." -- Ernest Hemingway