Chaos Blog

In Security, Platform Matters!

In Security, Platform Matters!

admin 07/03/2016 0
Cyberspace is getting scary! The number of incursions that has been reported to the Global Security Watch for 2015 represents a massive increase from the previous years. The complexity of the attacks, the scope of resulting damages, and the longevity...
Read More
The Shift from Security to Asset Protection

The Shift from Security to Asset Protection

admin 04/11/2015 0
Normally at this time of the month, SIL looks at the overall volume of models that have been run in the last month. Although this is most frequently a general review of numbers and counts, the composition of the models, their conceptual targets and o...
Read More
Autumn - Leaves are falling and models rising

Autumn - Leaves are falling and models rising

admin 08/10/2015 0
September was a busy month for SIL, with new thresholds and delivery targets reached on a weekly basis. SIL performed over 250K models in the month of September which represents 1000%+ growth from the same month in 2014. Many factors have driven this...
Read More
IT Failure Myopia - Business versus Technology

IT Failure Myopia - Business versus Technology

admin 17/09/2015 0
An exploration of perception of failure on projects in the SIL database shows that a large majority of line of business (LOB) executives blame the technology for the failure of their projects. This view into 503,227 projects in the last 4 years shows...
Read More
Dog Days of August 2015

Dog Days of August 2015

admin 02/09/2015 0
The Global Security Watch update for the end of August 2015 shows the escalation of successful incursions across the globe. The number of successful incursions are rising on a steep curve, with a myriad of factors driving those reports. One factor th...
Read More
Responsibility, Thy Name is Cisco

Responsibility, Thy Name is Cisco

admin 28/08/2015 0
Cisco has been in the news over the last few weeks due to the vulnerabilities that the company has identified in some of its routers. The Cisco router hacks are really a small portion of the overall router management software (RMS) attacks. SIL ran a...
Read More
Governance in Big Data - Bill Payment Industry

Governance in Big Data - Bill Payment Industry

admin 24/08/2015 0
The bill payment industry as a whole has not yet reached a collective conclusion on data governance for enterprise metadata. In fact, in a recent SIL analysis covering more than 83K organizations, the posture vis-à-vis governance of this data was sur...
Read More
Social Activism and Hacking

Social Activism and Hacking

admin 19/08/2015 0
One of the discussions that is in process on LinkedIn concerns social activism hacking. It has a great breadth of discussion with knowledgeable people and our CSE - Kat Lind has enjoyed participating in that discussion. (https://www.linkedin.com/grp/...
Read More
Changing Battlefield for Security

Changing Battlefield for Security

admin 17/08/2015 1
The complexities of security attacks have been increasing as the defenders of organization assets get more skilled. The change to multi-pronged and multi-vector attacks has stymied many businesses, in that the connection between the pieces of the ass...
Read More
Hot Time in the Summer for Security

Hot Time in the Summer for Security

admin 05/08/2015 0
Summer days traditionally mark the time for people to take vacations. Family availability and pleasant sightseeing environments encourage the middle of the year travel levels to be high. Somehow it seems a skewing of reasonability for the attacks on ...
Read More
How do you measure success?

How do you measure success?

admin 23/07/2015 0
So you have implemented a strategy, a new application, and new market. How do you know if you succeeded in your objective? Success can be difficult to articulate, but being able to do so can be key for organizational positioning, both internally and ...
Read More
Tracking Good Judgement

Tracking Good Judgement

admin 22/07/2015 0
How do you know if your decisions were good? Tracking success and shortfalls has been shown to be a key ingredient to a truly successful strategy, whether personal or professional. It is frequently difficult to articulate how well a decision has play...
Read More
BI Systems and Shelfware

BI Systems and Shelfware

admin 17/07/2015 0
Business intelligence (BI) systems and analytics are subjects of many model requests these days. What is surprising to us is that many BI systems are really not used effectively. SIL just completed a review of over 200K BI systems. More than 81.5% of...
Read More
IT Risk Assessment Class Open for Registration

IT Risk Assessment Class Open for Registration

admin 16/07/2015 1
As part of the SIL ongoing education series, the IT Risk Assessment class has been scheduled for twice during the remainder of 2015. The registration for the class session is open, and can be found at http://www.sil-usa.com/index.php?route=product/pr...
Read More
SIL CSE Interviewed by IBM Systems Journal

SIL CSE Interviewed by IBM Systems Journal

admin 15/07/2015 1
IBM Systems Journal has just published a great interview with SIL's Chief Systems Engineer about the challenges of implementing analytics. It makes for a very understandable summary of what customers are REALLY seeing from their analytics and why som...
Read More