Home » Posts tagged 'pr'
Tag Archives: pr
This is a ten step program to fight hacking attacks. You may or may not choose to ignore it, laugh at it, or ponder on it.
1) Internet security is a billion dollar business which will only grow in size as cloud computing approaches. Pioneers in providing security will earn considerable revenue like McAffee , Norton did in the PC era. Incidentally it also means the consulting/partner group that is willing to work with virtual workers and virtual payments to offshore consultants.
2) Industrial espionage has existed from the days the West stole Gunpowder and Silk formula from China (and China is now doing the same to its software). The company and country will the best hackers will win. Keep your team motivated mate, or it is very easy for them to defect to the other side of the (cyber) wall.
3) When 2 billion people have access to internet the number of hackers will grow in number and quality much more rapidly than when only 100 million people across the world had access. Thanks to Google Translate, Paypal, Skype video Call, Tor Project, and Google Voice i can and have collaborative with hackers almost in all geographies. You can only imagine what the black hats are doing.
4) Analyzing hackers is like reading Chinese Tea Leaves. If you have experienced analysts, you will slip up. recruit the hackers in the dormitory before China recruits them using Lulz Security as a bogus cover. or USA recruits them as cover for spreading democracy in the Arab countries.
5) get your website audited for security breaches. sponsor a hack my website contest. before someone else does it for you.
6) Fighting hackers was always tough. But now we have part time hackers , people with perfectly respectable jobs who look like Mr Andersen and hack like Neo from the Matrix. Every kid once wanted to be a firefighter. Every geek dreams of the one ultimate hack.
7) if you cant beat hackers, join them.
8) the more machine data is generated, the more you need external experts and newer software interfaces. Investing in open data, datasets is good. Keeping Bradley manning naked in his cell is bad. ignore the bad PR at your own cost.
9) Stop blaming China for every hack attack. You are a techie not a politician
10) Hack hard. Hack well. If someone hacks you, you will need to hack them off offensively unless you just want to be an easy mark for the rest of your lives. Counter -hacking expertise needs to be strengthened and groomed. hacking is an offense not just a defense game.
As part of the ongoing leadership series of SAS Inc in Las Vegas here is a press release-
SAS supplies super sleuthing powers with new case management solution
The Premier Business Leadership Series, LAS VEGAS (Oct. 28, 2009) – Organizations in areas such as banking, insurance, government and healthcare need to stay one step ahead of criminals and better manage investigations of fraud and other financial crimes. New software from SAS, the leader in business analytics software and services, arms investigators with the analytical power to streamline processes and investigations, helping to reduce costs and improve fraud prevention. SAS® Enterprise Case Management is the latest component to the recently announced SAS Fraud Framework.
A 2008 survey by the Association of Certified Fraud Examiners (ACFE) revealed that 90 percent of ACFE member companies expect fraud to continue growing, with internal fraud increasing most rapidly. A recent TowerGroup report1 in August 2009 found “case management can contribute a return on investment beyond fraud and risk mitigation by reducing operating costs and even uncovering new business opportunities. Case management offers an effective and automated means to leverage data used in fraud investigation for marketing and proactive customer outreach to improve retention.”
“Leading case management technologies will make it easier to see, aggregate, and integrate operational and other firmwide risks while helping to mitigate the cost and complexity of compliance,” said Rodney Nelsestuen, Senior Research Director at TowerGroup and author of the August 2009 report.
Case management, the backbone of documenting investigations, provides information for financial reporting, such as fraud losses, and is the primary resource for filing regulatory reports to government agencies. In addition, the disposition of cases under investigation is a critical element to enhance future monitoring and overall operational efficiencies of the organization.
Other advantages of SAS Enterprise Case Management include integrating information from siloed monitoring systems used by other lines of business, products, or channels. The system offers a triage queue where users can review work items sent to the system automatically prior to appending to an existing case, creating a new case, or closing the work item. SAS Enterprise Case Management pre-populates forms and automatically prepares batch reports to help the user meet e-filing standards for regulatory submission. The system includes interactive dashboards that enable management to analyze operational performance of investigative functions and recognize trends to provide improved oversight and governance of risk management practices.
Today’s announcement came at The Premier Business Leadership Series event in Las Vegas, a business conference presented by SAS that brings together more than 600 attendees from the public and private sectors to share ideas on critical business issues.
1. TowerGroup. The Evolution of Case Management: Converging Fraud, Risk, and Opportunity Management, Rodney Nelsestuen, August 31, 2009.
SAS is the leader in business analytics software and services, and the largest independent vendor in the business intelligence market. Through innovative solutions delivered within an integrated framework, SAS helps customers at more than 45,000 sites improve performance and deliver value by making better decisions faster. Since 1976 SAS has been giving customers around the world The Power to Know® .