My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |

 

This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


 

The future of post industrial digital currency, er, moneyOpen in a New Window

The discussions around digital currency continue. I had an interesting sort-of-argument with someone about this recently, and I mentioned in passing the dynamics of the shift from specie to token money during the industrial revolution. I think it’s worth expanding on this here, as to my mind it informs the debates about central bank digital […]

 

Mr. Pink doesn’t tip.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Global Innovation Product Manager, BT. Facing extortion at the hands of cyber criminals, what would you do? Bryan Fite reveals how he helped an organisation going through just that.  The start of a cyber saga. Some months ago, I was traveling home from a long, productive week of client and team meetings. […]

 

Panelists at TM Forum Live! Asia come to terms with digital realityOpen in a New Window

Put a bunch of operators and vendors together on a panel about digital transformation (or just about any topic, really) and you’re going to get some diverse comments. But at a panel on “coming to terms with the digital reality” at TM Forum Live! Asia on Wednesday, one point of agreement was that successful digital […]

 

News highlights – 8 DecemberOpen in a New Window

News highlights for 8 December White House concerned China not keeping cyber security bargain WASHINGTON (Reuters) – The White House said on Thursday that it raised concerns about China’s new cyber security law during a meeting with a Chinese official after the latest round of talks between the two countries on cyber crime. Read more… […]

 

Russian propaganda and cyber attacks on the rise, says GermanyOpen in a New Window

BERLIN (Reuters) – Germany’s domestic intelligence agency on Thursday reported a striking increase in Russian propaganda and disinformation campaigns aimed at destabilizing German society, and targeted cyber attacks against political parties. “We see aggressive and increased cyber spying and cyber operations that could potentially endanger German government officials, members of parliament and employees of democratic […]

 

ThyssenKrupp is the latest victim of massive cyber attackOpen in a New Window

FRANKFURT (Reuters) – Technical trade secrets were stolen from the steel production and manufacturing plant design divisions of ThyssenKrupp AG in cyber attacks earlier this year, the German company said on Thursday. ThyssenKrupp, one of the world’s largest steel makers, said it had been targeted by attackers located in southeast Asia engaged in what it […]

 

Juniper predicts eSports will be big in 2017, whatever that isOpen in a New Window

When the top prediction for 2017 involves something you have never even heard of you have to start worrying about age, mental health, that kind of thing. eSports, it turns out, will be huge next year. eSports, for anyone like us who has been asleep for the last year or two, is ‘the competitive playing […]

 

Americans happy with information avalanche, according to PewOpen in a New Window

WASHINGTON (Reuters) – Most Americans do not see “information overload” as a problem for them despite the explosion of internet data and images, according to a Pew Research Center survey on Wednesday. Only 20 percent of U.S. adults feel they get more information than they can handle, down from 27 percent a decade ago. Just […]

 

Four cyber security challenges for cloud deployment.Open in a New Window

Man using tabletIn our last blog, we explained the questions you need to ask before introducing the cloud. Here, we’ll share the challenges of deployment, and how to overcome them. Challenge one: the evolving threat landscape. An evolving cyber-threat landscape is something many organisations are aware of. But, over the past few years, new threats have become […]

 

Six tips for choosing the right penetration-testing partner.Open in a New Window

Bas de Graaf, Head of Product Management — Security Consulting, BT.By Bas de Graaf, Head of Product Management — Security Consulting, BT. Penetration testing is integral to security. But choosing the wrong partner could have significant implications, as Bas de Graaf, of BT’s Ethical Hacking capability, explains. Buy cheap, buy twice (and then some). Penetration testing is an area of cyber-security investment where you really […]

 

Tip nine — identify critical digital processes and high-risk integration points.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the ninth of his ten top tips for keeping your data, and organisation, secure. The only way to protect what matters to your organisation, is to first figure out exactly what is important to your organisation. You need […]

 

The war against cyber crime finds a historic home for new recruits — Bletchley Park.Open in a New Window

Mark Hughes, CEO, BT SecurityBy Mark Hughes, CEO Security, BT. Bletchley Park, famous home of WWII codebreaking, is about to find a new lease of life — with a key role in the fight against cyber crime. Cyber crime is a growing threat. You don’t have to look far to find recent examples of the threat posed by cyber […]

 

The cloud: cyber risk and business rewards.Open in a New Window

datacentreOrganisations taking advantage of the cloud risk their data. So it’s critical they deploy prevention-focused security architecture, as our whitepaper explains. The benefits of moving to the cloud. If it puts the security of your data at such risk from cyber criminals, why would organisations choose to move to the cloud? Well, the benefits of […]

 

Tip eight — concentrate your security supply chain.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the eighth of his ten top tips for keeping your data, and organisation, secure. The market for security is huge, with hundreds of vendors out there. This means that the sector is fragmented, but full of opportunity. Generally […]

 

How to win business by building on the trust of your customers.Open in a New Window

Mark HughesBy Mark Hughes, CEO Security, BT. It’s easy to think of cyber security purely in terms of mitigating risk. But the ability to tackle cyber crime effectively also offers new opportunities to organisations. In the last decade, organisations have taken advantage of new ways to reach customers — including PCs, smartphones and tablets. But these […]

 

How to stop cyber attacks before they even happen.Open in a New Window

Ramy Houssaini presenting at NIAS 16By Ramy Houssaini, Vice President of Security Europe, BT. You can’t win the war on cyber crime by waiting to defend yourself against an attack. Here’s why you need a more active approach to security. No one is safe from a breach. There’s a question about security that people ask me all the time — […]

 

Tip seven — apply ‘the onion effect’.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the seventh of his ten top tips for keeping your data, and organisation, secure. This is really about defence in depth. Imagine that the data you want to protect — your most valuable digital asset — is at […]

 

Why cyber threat intelligence matters.Open in a New Window

Mark Hughes, CEO, BT SecurityBy Mark Hughes, CEO Security, BT. Cyber criminals can innovate quicker than you can. Here’s why you need the right intelligence and expertise to do defend your networks and prevent a breach. Avoid being in the line of fire. Imagine you’re stuck in traffic, going nowhere quickly. Then, in your rear-view mirror, a set of […]

 

Tip six — make security everyone’s responsibility.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the sixth of his ten top tips for keeping your data, and organisation, secure. Thanks to the digital transformation we’ve seen over the past few years — think mobile phones, tablets, reliance on digital technology — people are […]

 

How to stay one step ahead of cyber crime.Open in a New Window

Image from Check Point's 2016 Security ReportTo defend your organisation from the creeping tendrils of cyber crime, you first need a view of exactly what you’re facing. Here’s how to get it. 2015 — a great year for cyber criminals. For cyber criminals 2015 was a seminal year. Organisations were hit by 971 unknown malware attacks every hour, a new DDOS […]

 

The day our cyber security apprentices became hackers…Open in a New Window

Image from Capture the Flag Apprenticeship eventWhen it comes to fighting cyber crime, you have to know your enemy. So here’s what happened when our cyber security apprentices turned hacktivist for a day. Turning to the dark side. Imagine you have to take down a corrupt energy company. And to do that, you need to hack into its servers and uncover […]

 

How we prepare our cyber security graduates for the future.Open in a New Window

DayConX logoInvesting in the future of cyber security is vital. So find out what happened when we sent three of our finest young minds to Day-Con X. Arming the security specialists of tomorrow. The world of cyber security changes so quickly, it can be hard to keep up. And that can cause real problems for organisations […]

 

Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]

 

Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]

 

An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013

 

18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]

 

BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now

 

Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]

 

Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]

 

Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]

 

Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]

 

It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
more Calendar
Spotlight
Paul Slot, KPNNewly Elected ETIS Vice Chairman
Charlotte Hersdorf, TDCNewly Elected ETIS Council Member

Surveys
 
Membership Software Powered by YourMembership  ::  Legal