Chaos Blog

New Executive Briefing Series!

New Executive Briefing Series!

admin 25/08/2016 0
One of the most significant problems in the movement to CyberBusiness is the education of and communication with the executive management of an organization. SIL addresses this every day in its reports and analyses. Many of those reports address similar information shortfalls. As a result, the Chief Systems Engineer at SIL, Kat Lind, has authored a series of Executive Briefing books to provide our...
Read More
SIL Launches SIL Business Sense!

SIL Launches SIL Business Sense!

admin 25/08/2016 0
SIL is pleased to announce the launch of a website focused on the needs of the SMB business world. Whether you are thinking of starting a new business or expanding into a new market, the targeted services that are offered thru SBS will assist you in many ways. Services that address needs for business case development, targeted analytics, and semantic analysis have been gathered together for easy s...
Read More
Cyberbusiness and Security - Justified Paranoia

Cyberbusiness and Security - Justified Paranoia

admin 21/07/2016 0
Our Chief Systems Engineer, Kat Lind, will be releasing her book on the security issues surrounding cyberbusiness. This book is available for pre-order on Amazon! Take a look at it here!...
Read More
Welcome Inanna's Circle Game Players

Welcome Inanna's Circle Game Players

admin 14/07/2016 0
Inanna's Circle Game is coming to the end of the first Mystery Box competition on SIL Creative Sense. This is a game where authors compete against their own best, spurred on by the interaction with the other players, the material that they must incorporate, and their own vivid imaginations. Drawn from the indie publishing group 20BooksTo50K, the authors range from very experienced writers to newco...
Read More
The Security Explosion

The Security Explosion

admin 06/07/2016 0
We have just passed the midway point of 2016, a time of evaluation, planning adjustment, and contemplation. At least it is for SIL. One of the most significant things that we examined at this time is the volume of models, and the composition of the model types and sources that have occurred during the first portion of the year.After the explosive growth in overall models that occurred in 2015, our...
Read More
The Shift from Security to Asset Protection

The Shift from Security to Asset Protection

admin 04/11/2015 0
Normally at this time of the month, SIL looks at the overall volume of models that have been run in the last month. Although this is most frequently a general review of numbers and counts, the composition of the models, their conceptual targets and other factors are also examined. From the first perspective, in the last year there has been a steady increase in requested model levels from both a mo...
Read More
Autumn - Leaves are falling and models rising

Autumn - Leaves are falling and models rising

admin 08/10/2015 0
September was a busy month for SIL, with new thresholds and delivery targets reached on a weekly basis. SIL performed over 250K models in the month of September which represents 1000%+ growth from the same month in 2014. Many factors have driven this growth. The base of the increase is the unmatched resource provided by the SIL database, which allows anonymous collaboration for organizations, worl...
Read More
IT Failure Myopia - Business versus Technology

IT Failure Myopia - Business versus Technology

admin 17/09/2015 0
An exploration of perception of failure on projects in the SIL database shows that a large majority of line of business (LOB) executives blame the technology for the failure of their projects. This view into 503,227 projects in the last 4 years shows how perceptions can force conclusions and conceptual frameworks. The practice of business blaming technology has grown to be a default stance in many...
Read More
Dog Days of August 2015

Dog Days of August 2015

admin 02/09/2015 0
The Global Security Watch update for the end of August 2015 shows the escalation of successful incursions across the globe. The number of successful incursions are rising on a steep curve, with a myriad of factors driving those reports. One factor that cannot be ignored is the increasing watchfulness and detection capabilities that organizations are implementing. As the defensive capabilities incr...
Read More
Responsibility, Thy Name is Cisco

Responsibility, Thy Name is Cisco

admin 28/08/2015 0
Cisco has been in the news over the last few weeks due to the vulnerabilities that the company has identified in some of its routers. The Cisco router hacks are really a small portion of the overall router management software (RMS) attacks. SIL ran a quick query against current data to look at trends in successful incursion patterns. The findings are aggregated world-wide, with a split out for tho...
Read More
Governance in Big Data - Bill Payment Industry

Governance in Big Data - Bill Payment Industry

admin 24/08/2015 0
The bill payment industry as a whole has not yet reached a collective conclusion on data governance for enterprise metadata. In fact, in a recent SIL analysis covering more than 83K organizations, the posture vis-à-vis governance of this data was surprising. SIL's study shows that in many cases the view on governance points to the difficulty in understanding what is needed to establish and maintai...
Read More
Social Activism and Hacking

Social Activism and Hacking

admin 19/08/2015 0
One of the discussions that is in process on LinkedIn concerns social activism hacking. It has a great breadth of discussion with knowledgeable people and our CSE - Kat Lind has enjoyed participating in that discussion. (https://www.linkedin.com/grp/post/38412-6035906724576190467) In support of her discussion, we ran a projection for social activism hacking based on the foundation of security anal...
Read More
Changing Battlefield for Security

Changing Battlefield for Security

admin 17/08/2015 1
The complexities of security attacks have been increasing as the defenders of organization assets get more skilled. The change to multi-pronged and multi-vector attacks has stymied many businesses, in that the connection between the pieces of the assault can be tenuous, or split by time and source. The ability to "connect the dots" of this type of picture is not widespread and calls for more colla...
Read More
Hot Time in the Summer for Security

Hot Time in the Summer for Security

admin 05/08/2015 0
Summer days traditionally mark the time for people to take vacations. Family availability and pleasant sightseeing environments encourage the middle of the year travel levels to be high. Somehow it seems a skewing of reasonability for the attacks on our computer infrastructure to be slanted toward these months. It is almost like the fact that we have fewer security personnel on duty to be a magnet...
Read More
How do you measure success?

How do you measure success?

admin 23/07/2015 0
So you have implemented a strategy, a new application, and new market. How do you know if you succeeded in your objective? Success can be difficult to articulate, but being able to do so can be key for organizational positioning, both internally and externally. Metrics and tracking of success allow the socialization of achievement, provide timely feedback to catch emerging problems and carry long-...
Read More