Tackling the privacy goals and profiling the data and network threats and solutions in a connected world.

  • Despite the hype and noise, Distributed Ledger Technology (DLT) and Blockchains  hold great promise in healthcare if executed correctly.  And there lies the challenge…’If done correctly!’ This CIC report sees Dr Robert M. Learney, a qualified doctor who studied medicine at Oxford University present the operational opportunities that blockchain and DLT could deliver to the healthcare ecosystem. Many will want and need to understand what is practical and how such technologies can address the demands and changing dynamics of the healthcare stakeholder community. Important questions such as how DLT and blockchains can advance and secure engagements and interactions within national and global healthcare networks. Specifically, CIC’s report offers insights into how DLT and Blockchains can be used to break walls between data silos and offer new ways for standardising healthcare data. Readers will be left with a number of take-away points that they can use to learn from what is promised by distributed ledger technology in healthcare and what has emerged so far.
  • In this CIC case study, you will learn how a 40+ year old leading furniture retailer in South Florida undertook a successful mobile transformation to improve its workforce’s productivity. Important points of focus:
    • An overview of the transformational journey that City Furniture needed to undertake
    • Discover four key insights underpinning City Furniture’s transformation execution
    • Review the dynamics of a transformation in action
    • Take away five essential lessons that can help guide other journeys
  • It's just three years since IBM set out a new security framework, designed to secure businesses operating over multiple platforms from on-premises to managed services and the cloud. Since then, the whole security focus at IBM has undergone radical restructuring and become its own division, with control over its own destiny. The result is a security approach that covers mobile devices to mainframes, on-premises deployment to cloud and a federated architecture that offers hope for the future. At IBM Interconnect 2015, the vendor’s newly formatted premier Cloud and mobile conference held in Las Vegas from 22nd to 27th February, CIC got a feel for the drive propelling the newly formed Security Business Unit forward.
  • Like many technologies, there has never been a golden age for computer security, where systems were perfectly secure and no-one did anything remotely bad. Mainframes and minicomputers were just as susceptible to people using acoustic couplers, low speed modems and hacking into local accounts in the 20th Century as modern systems are to hackers in the 21st Century. What has changed is the scale and the nature of the threat. That continually evolving threat means that the Chief Information Security Officer (CISO) and Chief Information Office (CIO) are struggling to understand how to combat the risk to the enterprise. IBM believes that, with decades of experience and a multi-billion dollar investment in this area, it can deliver the right architecture, knowledge, tools and skills to help solve this problem. In this report we take a look at IBM’s latest security story and how it is evolving to meet the threat which enterprises are facing.
  • The biggest non-news every year is the surveys that say c-level executives worry about protecting corporate data. It is time to evolve the way we do security and to introduce new approaches to dealing with new threats. In this article we look at the cost of getting security wrong and how we need to change.
  • Bola Rotibi, Research Director, Creative Intellect Consulting and founding member of the (ISC)2 Application Security Advisory Board, looks at the ‘ownership’ challenge in securing software. Reprint.
  • As we have begun to closely define the technologies that make up Cloud computing, the overuse of the phrase is causing confusion and no where moreso than in the crucial area of security in the Cloud. This reports examines what it really means in detail.
  • In October and November 2010, Creative Intellect Consulting UK undertook a survey to understand the impact of security on the software development and delivery processes. This report, carried out after an in- depth survey with members of information security professional body (ISC)2; the International Association of Software Architects (IASA); software development, IT and information security professionals; and software architects around the world, represents current practices firmly in the dock. It throws up in black and white just how serious the issue is.