Securely Sustaining Software-Intensive Systems
Great authorization and authentication will not save a system from a poorly planned implementation and sustainment. Shepherding a software-intensive system through project development to implementation is just the beginning of the saga. Modern software-intensive systems face the confusing and multifaceted challenge of sustainment. After implementation is when the security problems will show up.
Securely Sustaining Software-Intensive Systems
Great authorization and authentication will not save a system from a poorly planned implementation and sustainment. Shepherding a software-intensive system through project development to implementation is just the beginning of the saga. Modern software-intensive systems face the confusing and multifaceted challenge of sustainment. After implementation is when the security problems will show up.
Authentication Mechanisms You Can Bank On
DISCLAIMER: The opinions expressed herein represent those of the author and do not necessarily represent, nor are they intended to represent, those of the author's employer.
Authentication Mechanisms You Can Bank On
DISCLAIMER: The opinions expressed herein represent those of the author and do not necessarily represent, nor are they intended to represent, those of the author's employer.
Contribution: Security and Identity Management at Tata Consultancy Services
Tata Consultancy Services Ltd. (TCS) is the oldest and largest IT company in India. Founded in 1968, TCS has recently seen an enormous growth spurt. While TCS had always been the standard bearer for India's IT industry, the company had grown quite slowly until a few years ago, when the pace changed significantly, due in part to a much publicized and extremely successful IPO.
Contribution: Security and Identity Management at Tata Consultancy Services
Tata Consultancy Services Ltd. (TCS) is the oldest and largest IT company in India. Founded in 1968, TCS has recently seen an enormous growth spurt. While TCS had always been the standard bearer for India's IT industry, the company had grown quite slowly until a few years ago, when the pace changed significantly, due in part to a much publicized and extremely successful IPO.
Are We Ready to Face Next-Generation Spam?
There is no official definition of spam, yet most people know it when they see it. We consider spam to be advertisements or, more generally, all the e-mails that we do not want to appear in our mailbox. Formally, spam has three defining characteristics: it uses electronic means such as e-mail, is unsolicited, and comes in bulk.
Are We Ready to Face Next-Generation Spam?
There is no official definition of spam, yet most people know it when they see it. We consider spam to be advertisements or, more generally, all the e-mails that we do not want to appear in our mailbox. Formally, spam has three defining characteristics: it uses electronic means such as e-mail, is unsolicited, and comes in bulk.
Agile Methods and Risk
All agile methods constitute a highly disciplined set of practices meant to accommodate the realities of change and flux in high-risk system development.
WHAT MAKES AGILE METHODS SO VALUABLE FOR HIGH-RISK PROJECTS?From my perspective, agile methods have inculcated some risk-mitigation strategies for common risks into their techniques. Consider the following:
Lessons Learned (And Not): Part II
In this Executive Update and two more that follow in this series, we continue our examination into the subject of lessons learned based upon the results of a recent Cutter Consortium survey. In our survey of 105 IS/IT managers from around the world (for more information on survey demographics, see Part I [Vol. 2, No.
Lessons Learned (And Not): Part II
In this Executive Update and two more that follow in this series, we continue our examination into the subject of lessons learned based upon the results of a recent Cutter Consortium survey. In our survey of 105 IS/IT managers from around the world (for more information on survey demographics, see Part I [Vol. 2, No.
Organizational Politics: How to Play the Game and Win
Ask any IT professional what words and phrases spring to mind when you mention the words "organizational politics," and nine times out of 10 you will get responses such as:
Organizational Politics: How to Play the Game and Win
Ask any IT professional what words and phrases spring to mind when you mention the words "organizational politics," and nine times out of 10 you will get responses such as:
Indicators of Culture Change
There are at least 12 major behavioral indicators that an organization's leadership can use to determine whether it is creating an effective enterprise risk management (ERM) organizational culture.
Indicators of Culture Change
There are at least 12 major behavioral indicators that an organization's leadership can use to determine whether it is creating an effective enterprise risk management (ERM) organizational culture.
How Common Is IT Offshore Outsourcing?
How significant is the offshoring question? Is the intensity of the debate that it has sparked justified (or, in zoological terms, is the elephant really that big)? And is the controversy, as some people seem to believe, mainly a US issue? The topic has certainly drawn a great deal of interest from some prominent participants, including not only the IEEE but also the US Congress and the United Nations.
How Common Is IT Offshore Outsourcing?
How significant is the offshoring question? Is the intensity of the debate that it has sparked justified (or, in zoological terms, is the elephant really that big)? And is the controversy, as some people seem to believe, mainly a US issue? The topic has certainly drawn a great deal of interest from some prominent participants, including not only the IEEE but also the US Congress and the United Nations.
How Common Is IT Offshore Outsourcing?
How significant is the offshoring question? Is the intensity of the debate that it has sparked justified (or, in zoological terms, is the elephant really that big)? And is the controversy, as some people seem to believe, mainly a US issue? The topic has certainly drawn a great deal of interest from some prominent participants, including not only the IEEE but also the US Congress and the United Nations.


