Chaos Blog

CyberBusiness - Altering the Face of Risk

CyberBusiness - Altering the Face of Risk

admin 08/06/2017 0
Splitting the risk profiles between operational and security is necessitated by the significantly different factors that build the risk profile. Operational risk still has the same metrics and input that are present in a non-cyber business for the most part, but security risk has a far different shape. As discussed before, this is the difference between passive risk calculation and the type of ris...
Read More
CyberBusiness - Components of Risk

CyberBusiness - Components of Risk

admin 01/06/2017 0
CyberBusiness - Components of RiskTo understand risk on both a strategic and tactical basis, it is crucial that the right elements of risk be considered. After all, basing decisions on scant information does not provide the solid foundation that an organization needs to exercise good judgment.The factors that go into a risk evaluation basically fall into two camps: the benefits or opportunities on...
Read More
Evolution of Risk Assessment

Evolution of Risk Assessment

admin 30/05/2017 0
CyberBusiness and Risk The basic tenet of risk analysis is that every opportunity is associated with a corresponding risk level. A significant portion of business management is comprised of balancing and analyzing cost versus benefit. Essential to that process is the weighting that risk provides to both sides of the ledger. Over time, people have come to an almost automatic evaluation of general r...
Read More
Ignore Hacktivism at Your Own Risk

Ignore Hacktivism at Your Own Risk

admin 11/04/2017 0
Solitaire Interglobal Ltd’s Global Security Watch has been tracking the impact of security incursions on businesses worldwide for close to 21 years. During that time there has been a large shift in the behavior of cyber attacks and the evolution of cyber threats. One notable pattern is that of what is currently called “hacktivism.” This particular type of cybercrime is perpetrated against individu...
Read More
New Executive Briefing Series!

New Executive Briefing Series!

admin 25/08/2016 0
One of the most significant problems in the movement to CyberBusiness is the education of and communication with the executive management of an organization. SIL addresses this every day in its reports and analyses. Many of those reports address similar information shortfalls. As a result, the Chief Systems Engineer at SIL, Kat Lind, has authored a series of Executive Briefing books to provide our...
Read More
SIL Launches SIL Business Sense!

SIL Launches SIL Business Sense!

admin 25/08/2016 0
SIL is pleased to announce the launch of a website focused on the needs of the SMB business world. Whether you are thinking of starting a new business or expanding into a new market, the targeted services that are offered thru SBS will assist you in many ways. Services that address needs for business case development, targeted analytics, and semantic analysis have been gathered together for easy s...
Read More
Cyberbusiness and Security - Justified Paranoia

Cyberbusiness and Security - Justified Paranoia

admin 21/07/2016 0
Our Chief Systems Engineer, Kat Lind, will be releasing her book on the security issues surrounding cyberbusiness. This book is available for pre-order on Amazon! Take a look at it here!...
Read More
Welcome Inanna's Circle Game Players

Welcome Inanna's Circle Game Players

admin 14/07/2016 0
Inanna's Circle Game is coming to the end of the first Mystery Box competition on SIL Creative Sense. This is a game where authors compete against their own best, spurred on by the interaction with the other players, the material that they must incorporate, and their own vivid imaginations. Drawn from the indie publishing group 20BooksTo50K, the authors range from very experienced writers to newco...
Read More
The Security Explosion

The Security Explosion

admin 06/07/2016 0
We have just passed the midway point of 2016, a time of evaluation, planning adjustment, and contemplation. At least it is for SIL. One of the most significant things that we examined at this time is the volume of models, and the composition of the model types and sources that have occurred during the first portion of the year.After the explosive growth in overall models that occurred in 2015, our...
Read More
The Shift from Security to Asset Protection

The Shift from Security to Asset Protection

admin 04/11/2015 0
Normally at this time of the month, SIL looks at the overall volume of models that have been run in the last month. Although this is most frequently a general review of numbers and counts, the composition of the models, their conceptual targets and other factors are also examined. From the first perspective, in the last year there has been a steady increase in requested model levels from both a mo...
Read More
Autumn - Leaves are falling and models rising

Autumn - Leaves are falling and models rising

admin 08/10/2015 0
September was a busy month for SIL, with new thresholds and delivery targets reached on a weekly basis. SIL performed over 250K models in the month of September which represents 1000%+ growth from the same month in 2014. Many factors have driven this growth. The base of the increase is the unmatched resource provided by the SIL database, which allows anonymous collaboration for organizations, worl...
Read More
IT Failure Myopia - Business versus Technology

IT Failure Myopia - Business versus Technology

admin 17/09/2015 0
An exploration of perception of failure on projects in the SIL database shows that a large majority of line of business (LOB) executives blame the technology for the failure of their projects. This view into 503,227 projects in the last 4 years shows how perceptions can force conclusions and conceptual frameworks. The practice of business blaming technology has grown to be a default stance in many...
Read More
Dog Days of August 2015

Dog Days of August 2015

admin 02/09/2015 0
The Global Security Watch update for the end of August 2015 shows the escalation of successful incursions across the globe. The number of successful incursions are rising on a steep curve, with a myriad of factors driving those reports. One factor that cannot be ignored is the increasing watchfulness and detection capabilities that organizations are implementing. As the defensive capabilities incr...
Read More
Responsibility, Thy Name is Cisco

Responsibility, Thy Name is Cisco

admin 28/08/2015 0
Cisco has been in the news over the last few weeks due to the vulnerabilities that the company has identified in some of its routers. The Cisco router hacks are really a small portion of the overall router management software (RMS) attacks. SIL ran a quick query against current data to look at trends in successful incursion patterns. The findings are aggregated world-wide, with a split out for tho...
Read More
Governance in Big Data - Bill Payment Industry

Governance in Big Data - Bill Payment Industry

admin 24/08/2015 0
The bill payment industry as a whole has not yet reached a collective conclusion on data governance for enterprise metadata. In fact, in a recent SIL analysis covering more than 83K organizations, the posture vis-à-vis governance of this data was surprising. SIL's study shows that in many cases the view on governance points to the difficulty in understanding what is needed to establish and maintai...
Read More