Skip to main content
Cutter Consortium Cutter Consortium
  • Search
  • Login
  • Sign up
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter
  1. Home
  2. Journals
  • Securing Cyberspace: Is It Time to Rethink Our Strategy?

    January 2006

    "Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."

    In this issue:
    • Securing Cyberspace: Is It Time to Rethink Our Strategy?
    • Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement
    • Cyber Risk Management: The Need for Effective Public and Private Partnership
    • Investing in Cyber Security: The Path to Good Practice
    • Securely Sustaining Software-Intensive Systems
    • Authentication Mechanisms You Can Bank On
    • Contribution: Security and Identity Management at Tata Consultancy Services
    • Are We Ready to Face Next-Generation Spam?
  • Doing Privacy Right Using Data and Preserving Trust

    January 2006

    In the last issue of CBR, we focused on an important and timely topic: security and IT risk management.There I made the case for why the "uninitiated public" has a strong incentive to care about security: "The increasing prevalence of computer systems as well as the growing amount of our personal data that is stored by business firms, nonprofit organizations, and governmental entities (and can therefore be compromised) suggests that even the uninitiated public should pay attention." But, as we learn from our experts in this installment of CBR, our personal data being compr

    In this issue:
    • Doing Privacy Right Using Data and Preserving Trust
    • Privacy in Search of Governance
    • Who's Accountable for Privacy? Data Governance in a World of ID Theft
    • Corporate Privacy Governance: Not Free, But Can You Do Without It?
    • Trends in Corporate Privacy Governance Survey Data
  • Agile Data Techniques

    December 2005

    "I believe that we're starting to see a trend away from the serial, and often bureaucratic, methods that pervade many data groups toward an evolutionary/agile approach that reflects modern software development practices."

    In this issue:
    • Agile Data Techniques
    • Agile Data Techniques: Opening Statement
    • Evolutionary Database Development Techniques
    • Agile Database Testing
    • Enabling Agile Database Development: A Case Study
    • Agile Applications as Open-Vocabulary English Business Rules over SQL
    • Data and Agile Methods
  • Security and Risk Management: The Never-Ending Game of Chess

    December 2005

    Viruses, Trojan horses, worms, time bombs, adware, spyware, keystroke tracking tools, spoofing, snooping, sniffers -- these are some of the most popular examples of malicious code and techniques that modern organizations find themselves fighting. Couple this seemingly unabated tide of new releases and new forms of harmful software with human threats like crackers, thieves, industrial espionage contractors, and your own disgruntled or ill-intentioned employees, and what do you get? You get a complex cocktail of potential security headaches. How big a headache?

    In this issue:
    • Security and Risk Management: The Never-Ending Game of Chess
    • Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk?
    • Information Security -- A Difficult Game: Things to Think About When Planning Your Next Move
    • Security: A Game Worth Playing
    • IT Risk Management/Security Survey Data Collected by Cutter Consortium
  • It's Your Responsibility: Managing the Transition to Open Source Software

    November 2005

    From the Editor, Gabriele Piccoli

    Some debate can be had about the exact birth date of the open source software movement. Was it when computer enthusiasts and scientists began to exchange code? Was it at the time of the birth of the Internet when the infrastructure was made available to enable further collaboration?

    In this issue:
    • It's Your Responsibility: Managing the Transition to Open Source Software
    • The Business of Open Source: A Strategic Perspective
    • The Enterprise Transition to Open Source: Following the Yellow Brick Road
    • Open Source: A Reality That Still Requires Careful Management
    • Use of Open Source Software: A Summary of Survey Data

Pagination

  • Previous page
  • 62
  • Next page

Subscribe to free newsletters

Cutter connects the brightest minds from every field, creating unparalleled collective intelligence and transforming what’s possible.

Subscribe

Contact us

  • Cutter Consortium,
    an Arthur D. Little community
  • 10 High Street, Suite 900
    Boston, MA 02110 USA
    +1 (781) 648-8700
    service@cutter.com

Cutter | An Arthur D Little Company

Cutter | An Arthur D Little Company

Copyright © 2025 Arthur D. Little  |   All Rights Reserved. Privacy Policy | Terms of Service
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter