Authors: Stefan Pauly and Gerhard Kaucky
Looking at the current hype around Digitalization we recognize the positions and arguments of two groups: One group is Sales and Marketing, CEOs and CMOs who reflect about the business value of Digitalization, about new sales and service channels, digitalized products, and – in general – renewed business processes. Read More
In 2009, a nuclear facility at Natanz in Iran became the location of an event that had never happened before: a highly complex and clever worm overcame several security barriers and sabotaged the functioning of the technical equipment necessary to enrich uranium, postponing the country’s nuclear program. This worm you may still remember, as Stuxnet gained access to control systems through connected computers, causing far-reaching political consequences as the world’s first cyber weapon attack. Is such an attack also possible in the D.A.CH. region, endangering our energy supply? Read More
Too many still think and act as Digital Transformation topics like IoT, Industry40 etc. are a pure technical topic.
The value resides in the intelligent combination of business & IT – well, that should be a no-brainer, but are we as IT companies, Service Providers, Consultants etc really acting on this? Read More
Imagine you had a burglar alarm for your IT infrastructure: a tool that raises your awareness of any anomaly detected in your cyber-environment. This is what a SIEM (Security Information and Event Management; pronounced SIM, with a silent e) tool does. The basic inputs are log-files, generated by your system’s components. Those are analyzed against a standard set of rules defining the normal state of your network. Once you are facing the decision to install such a system, a product description that it is working in ‘real-time’ will certainly be compelling. But is this promise realistic and valuable? Read More