Is your Application Development Secure?

As companies more and more rely on more specific business applications in today’s fast paced business environment, the software development facilities serving the company have become a strategic partner. A partner that has become overwhelmingly occupied with projects so detailed and complex that it was just necessary to split up the project phases that developers can concentrate on their core duties… the code itself. So far so good, you have it all; your Project Management Office to coordinate the efforts and assign resources, Business Analysts…

Driving the Digital Vehicle

It’s not just central locking systems, power mirrors or the 18 electromechanical actuators one German luxury car had built into the driver’s seat as early as 1985 – the majority of vehicle processes have been managed electrically/electronically for decades. While today E/E components make up 20% to 40% of manufacturing costs of a car, this proportion is expected to rise to at least 50% in the years to come. This is not just due to the fact that the vehicles’ internal control mechanisms are becoming…

Big Data Blues Ahead? Dynamic & Individual Online Pricing

As you might recall from last year’s post on Cybersecurity issues of innovations in stationary and online retail, dynamic and individualized pricing supported by Big Data analytics is already being experimented with by many firms. It could happen that retailers have to prepare for legislator’s reactions in the near future.

Digitale Agenda – Quo vadis?

Die Informations- und Kommunikationstechnologie (IKT) ist zum Nervensystem unserer “smarten” Gesellschaft geworden. Und trotzdem haben wir noch keine flächendeckende digitale Agenda in der öffentlichen Verwaltung, wie unsere letzte Studie ergeben hat. 

ISMS-Alternativen zum BSI Grundschutztool

Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat mit dem IT Grundschutz eine Methode für ein effektives Management der Informationssicherheit entwickelt. Sie lässt sich flexibel an die Gegebenheiten einer Organisation anpassen. Ebenso lassen sich Gefährdungen und Risiken ermitteln und Maßnahmen für den betroffenen Geltungsbereich (IT-Verbund) ableiten.

Copyright 2016 21st CENTURY IT · RSS Feed · Anmelden