Finding Commonality: Converging Healthcare Organizations Need to Focus on Patient-Centric Care

There’s a lot of discussion about the impact of chronic diseases, aging populations and rising healthcare costs in every market and region, but it’s worth taking a step back in order to understand how these developments are impacting the wider healthcare environment at a global level. Read More

M&A Cyber-insecurity and (Mis-)conceptions

2016 marks a record-breaking year for M&A activities. Unfortunately, it’s also another year of a large number of data breaches and hacks becoming front-page news. CxOs, law firms, dealmakers and investors involved in M&A generally ignore Cyber risks that have implication on deal execution, deal value, reputation; post-M&A liabilities, operations and bottom-line; or acquirer vulnerability. This is partly based on awareness, lack of knowledge or misconceptions about Cyber risks and assessments. Read More

Digitale Agenda – Quo vadis?

Die Informations- und Kommunikationstechnologie (IKT) ist zum Nervensystem unserer “smarten” Gesellschaft geworden. Und trotzdem haben wir noch keine flächendeckende digitale Agenda in der öffentlichen Verwaltung, wie unsere letzte Studie ergeben hatRead More

The Future of Enterprise Information Management

Enterprise Information Management (EIM) has evolved over the past decade and is an accustomed component of every enterprise. It is seen by many in our ever-changing and fast developing IT world as a slow moving heavy dinosaur, based on on-premise solutions. Read More

Certificate Housekeeping

Nearly every application software brings a number of certificates with it. If you ask long-term IT security experts, they typically estimate that between 30 to 3,000 certificates are installed on any given PC. In reality a standard Windows 8.1 system easily has 30,000 and more certificates. MacOS 10.6 contains 2,000 certificates. Even on a Linux system (e.g. UBUNTU 14) there are 800 certificates. Unfortunately, lots of these certificates are outdated, are provided by untrustworthy issuers or use weak cryptography. Some certificates were generated a decade ago and are still in use. Due to the fact that certificates are the trust anchors of each and every digital communication, we think it is time for an enhanced certificate housekeeping. Read More

Copyright 2017 21st CENTURY IT · RSS Feed · Anmelden