My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |

 

This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


 

The future of cryptocurrency may or may not include bitcoinOpen in a New Window

The future of cryptocurrency for banks could be as a settlement money that connects other different monies. The big question is whether this is this a role for Bitcoin specifically? My old friend Alistair Milne recently published a very interesting paper on Cryptocurrencies from an Austrian Perspective (SSRN, 12th April 2017) in which he explores the use of new […]

 

The BakerHostetler report says back to basics is best for securityOpen in a New Window

The BakerHostetler report says companies need to continue focusing on the basics to become and remain “Compromise Ready.” The BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the legal and business risks associated with cyber threats and to have enterprise-wide tactics […]

 

News highlights – 27 AprilOpen in a New Window

News highlights for 27 April Alphabet’s profits surge 29% (Reuters) – Google parent Alphabet Inc posted a surge in profit and revenue on Thursday as its core advertising business continued to grow at an extraordinary rate and problems such as an advertiser boycott of YouTube had little impact. Read more… Microsoft profits surge 28% (Reuters) […]

 

Facebook to fight false amplification by GovernmentsOpen in a New Window

SAN FRANCISCO (Reuters) – Facebook Inc acknowledged on Thursday that it has become a battleground for governments seeking to manipulate public opinion in other countries and outlined new measures it is taking to combat what it calls “information operations” that go well beyond the phenomenon known as fake news. In a report and summary of […]

 

Marks and Spencer fight back with online grocery shoppingOpen in a New Window

LONDON (Reuters) – British retailer Marks & Spencer is to trial an online grocery shopping service this year, it said on Thursday, conceding it could no longer ignore the fastest growing segment of the market. For years M&S has resisted giving its customers the option of ordering food online for home delivery, saying it did […]

 

Assurance needs to be upgraded for the new digital journeyOpen in a New Window

As the race to become digital gathers pace, telcos must focus on revenue assurance to stop potential losses. In a recent survey sponsored by Openet and conducted by Telecoms.com fully 90% of 117 operators said that 10% of their revenue would come from digital services in 2017. Over 30% believe this figure will be over […]

 

Hackers were hacking Windows even as Microsoft fixed the problemOpen in a New Window

SAN FRANCISCO (Reuters) – To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as CVE-2017-0199. The bug was unusually dangerous but of a common genre: it was in Microsoft software, could allow a hacker to seize control of a personal […]

 

Our security blog is about to be transformed…Open in a New Window

Someone using a tabletChange is on the horizon. Our security blog is getting a fresh look and new functionality. Here’s what you need to know. This blog has always been a place where you can get the latest news, as well as views and insights from those working in the industry. And that’s not going to change. What […]

 

Hackers Matter: Issue two — the disclosure game.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. You can patch known bugs in your system, but what about the ones you don’t know about? Here’s why ‘the disclosure game’ is vital to your cyber security. An eventful trip to Troopers. I’m just back from Troopers, the best hacker conference in the world. This year, it celebrated […]

 

Securing applications with blockchain: Issue one — an introduction to blockchain.Open in a New Window

chip and PIN paymentBlockchain is the big new idea in tech, but is it worth the hype? Discover how it actually works (and why it matters to the security of your applications).   Dr Jonathan Tate, Solution Architecture Lead, Security CTO Team       Dr Joshua J Daniel, Senior Researcher, Security Futures Practice.     Introducing blockchain. […]

 

Mind the security gap with effective endpoint protection.Open in a New Window

Rob Daniels, General Manager of Security Portfolio Strategy, BT.By Rob Daniels, General Manager of Security Portfolio Strategy, BT. It used to be simple for organisations to protect devices at work. But here’s how mobile working has made endpoint security more critical than ever. Securing a more mobile world. You’re probably reading this on a mobile device or a laptop. That’s the way we […]

 

Discover how DMARC keeps spoofed email addresses out of your inbox.Open in a New Window

Peter Negus, Solutions Architect, BT.By Peter Negus, Solutions Architect, BT. Discover how Domain-based Message Authentication, Reporting and Conformance (DMARC) improves security and keeps spoofed email addresses out of your inbox.   Spoofing emails and cyber security.   It’s 6pm on Friday and you need to go home. An email from what appears to be security@bt.com arrives in your inbox. […]

 

Getting your security ready for GDPR.Open in a New Window

Jose Francisco Pereiro Seco, Head of Data Security Europe, BT.By Jose Francisco Pereiro Seco, Head of Data Security Europe, BT. Digital transformation unlocks huge potential — and raises significant data protection and privacy risks. Here’s what the GDPR means for your security. Regulatory change for a digital world: GDPR. On 14 April 2016, the European Parliament adopted a new regulation that will replace the […]

 

Make sure you’re prepared for GDPR.Open in a New Window

Guus van Es, General Manager, Security Consulting, BT.By Guus van Es, General Manager, Security Consulting, BT. BT’s security consultants have long advised customers to design security and data protection into their core processes. Innovation and security are two sides of the same coin. This combined ‘outside-in’ and ‘inside-out’ approach to security makes sense in a threat environment that is changing so rapidly. […]

 

Keep your cyber security afloat in a sea of threats.Open in a New Window

Deborah Moir, Security Consultant, BT.By Deborah Moir, Security Consultant, BT. Securing your network against cyber crime is a bit like trying to keep water out of a leaky boat. Here’s the process you need, if you want to stay afloat. A dangerous situation. Imagine you’re at sea and the weather’s bad. You and a small crew are piloting a […]

 

Power ahead: manage risks and embrace digital disruption.Open in a New Window

An aeroplaneBy Ramy Houssaini, Vice President of Security Europe, BT. Our digital world is thriving. Rapid innovation is radically changing the technology and cyber-risk landscape. New business models relying on cloud and mobile environments are continuously dissolving the traditional perimeter, scattering data everywhere and creating new exposures. Digital trust is rapidly emerging as the new competitive frontier […]

 

Hackers matter: Issue one — hackers wanted.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. ‘Hacker’ is an emotive term today. But, go back to its roots, and there’s a clear case for teaching, mentoring and developing hacker skills. We all need hackers. I’m going to start with a provocative statement: hackers are a national resource and should be encouraged, cultivated and embraced. There, […]

 

How to achieve the ‘Fort Knox’ of cyber security.Open in a New Window

Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT.By Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT. The City of London took its expertise in fighting digital crime to Asia, exploring how the right cyber defences can offer a digital version of Fort Knox. Protecting the cyber equivalent of Fort Knox. As a world-leading hub of digital enterprise, the City […]

 

Security-enabled business: Software-defined networks.Open in a New Window

Sam Cater, Future Cyber Capabilities Specialist, BT.By Sam Cater, Future Cyber Capabilities Specialist, BT. The development of SDN in recent years has made it an incredibly useful technology, but it comes with an unfortunate side-effect… How SDN works. A software-defined network (SDN) is essentially a TCP/IP stack which is driven by a software application as opposed to the operating system’s kernel. […]

 

Can a data breach be a good thing?Open in a New Window

By Rob Partridge, Head of the BT Cyber Security Academy. Big security breaches gain headlines, but organisations often fail to learn from them. Here’s how our apprentices help us avoid a car crash for cyber security. Failing to learn the right lessons. Rubbernecking; we’ve all been there. Driving along the motorway, and suddenly the traffic […]

 

Security-enabled business: Cloud Access Security Brokers.Open in a New Window

datacentreMore organisations are aware of productivity-boosting cloud applications, but few know how to use these securely. That’s where Cloud Access Security Brokers can help. Clouds. Visibility, nil. As organisations seek to benefit from the flexibility, convenience and cost-efficiency of the cloud, security is expanding out of the data centre. This leaves security decision-makers without visibility […]

 

Humans Matter: Issue four – Are you a maestro?Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan K. Fite, Account CISO, BT. Recent technology conferences have shown that orchestration of robotic workforces has some way to go to replace the human touch. Bryan K. Fite explores why. No one has ‘the answer’. As I write this blog, I’m sitting in a small sushi joint at the top of a hill […]

 

Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]

 

Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]

 

An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013

 

18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]

 

BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now

 

Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]

 

Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]

 

Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]

 

Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]

 

It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
 
Membership Software Powered by YourMembership  ::  Legal