Failure to innovate and evolve has been the death knell of many former industry leaders – think of Polaroid or Digital Equipment. Both are no longer relevant,, and both failed to respond effectively as the world around them changed. Lack of innovation is in itself a major risk and, for many companies, IT is a a key enabler (or dis-abler) of innovation. Continue reading
Category Archives: Software@Risk™
#49 – IT APPLICATION DEVELOPMENT GUIDELINES – ED PERKINS
The folks over at the NIST Information Technology Labs (ITL) have been busy. One complaint about the recently released Risk Management Framework (RMF) [1], developed in response the President’s Executive Order 13636 on Improving Critical Infrastructure Cybersecurity, was that it did not address application security (the coding practices that allow for SQL injection, buffer overflow, etc). [2]. Continue reading
#46 – WHAT SOFTWARE PROJECT MANAGERS AND DEVELOPERS WILL HAVE BY 2023 – CAPERS JONES
If you consider the common problems of major software projects such as outright cancellation, schedule slips, and cost overruns it is clear that project managers and developers need better tools and better data than is common today.
What will probably be available within 10 years are these fully integrated capabilities that combine predictive analytics and full project measures and advanced development from certified reusable materials: Continue reading
#46 – WHY I DIDN’T LEARN TO STOP WORRYING AND LOVE FACEBOOK? – CAROLY TURBYFILL PHD
TRADITIONAL COMPANIES, THE SOCIAL ERA AND PRIVACY
(A tribute toDr. Strangelove or: How I Learned to Stop Worrying and Love the Bomb)
Nilofer Merchant is an Internet champion for Social Era businesses in her blog: Continue reading
#45 – IS YOUR PERSONAL INFORMATION SAFE? – CAROLYN TURBYFILL
In the last 6 months, I have been notified by 3 different vendors: Adobe, Target and University of Maryland University College, of 4 data breaches.
Three of the breaches involved consumer data theft that may have or provably have compromised some of my private information: i.e. Login credentials; credit card. The amount of time between the breach and the notification of potentially affected parties has varied between 4 days and 7 weeks. Continue reading