May 09, 2019, by Mike Smart
NelsonHall recently visited Accenture at its Cyber Fusion Center in Washington D.C. to discuss innovations in its cyber resiliency offerings and the recent launch of its new digital identity tool, Zoran.
Failings of existing role-based access (RBA)
Typical identity and access management (IAM) systems control users’ access to data based on their role, i.e. position, compe[...]
Nov 23, 2017, by Mike Smart
Mike Smart reports directly from IBM’s European Analyst & Advisory Exchange 2017 with some quick take-aways regarding IBM’s transition from systems integrator to services integrator and its business resiliency services.[...]
Nov 09, 2017, by Mike Smart
In this, the second of two articles on GDPR, I look at how IT services vendors can help companies meet GDPR compliance in several areas. You can read the first article, ‘The Impact & Benefits of GDPR for Organizations’, here.
Application services
Application services can help organizations in ensuring that new and legacy applications meet the GDPR articles perta[...]
Oct 12, 2017, by Mike Smart
In this, the first of two articles on GDPR, I look at how the regulation is set to impact companies, and at the benefits of compliance beyond simply avoiding penalties.
The EU's General Data Protection Regulation (GDPR) was adopted in April 2016 and will be put into force on 25 May 2018. The unified and enforceable laws contained in the regulation replace the o[...]
Aug 01, 2017, by Mike Smart
When NelsonHall spoke to Atos earlier in the year about its managed security services, there was a clear push to move clients away from reactive security to a predictive and prescriptive security environment, so not only monitoring the end-to-end security of a client but also performing analytics on how the business and its customers would be affected by threats. Atos’ “S[...]
Jul 18, 2017, by Mike Smart
Every day the sheer amount and complexity of cybersecurity information that security analysts are required to sift through increases. Analysts arrive at the start of each day, catch-up on recent attacks and research cybersecurity news, and are thrown into analyzing security incidents: going down the rabbit hole of reviewing data flows, finding outliers, investigating IPs, searching through both in[...]
May 16, 2017, by Mike Smart
Last Friday morning, the largest ransomware cyber attack infected an unprecedented number of machines across organizations worldwide. The ransomware named WannaCry demanded $300 in Bitcoins to be paid in three days, otherwise the ransom would double. If no payment was made after seven days, data would be deleted forever.
WannaCry ransom message
Each time this ran[...]
Jul 08, 2016, by Dominique Raviart
Four years ago, at the time of the London 2012 Olympics and Paralympic Games, NelsonHall reported on the work Atos does for the International Olympic Committee (IOC) though its Major Events unit. See our previous commentary here. This week we visited its center in Barcelona to get an update on the work it is doing for the Rio Games starting next month,
The Olympic Games remain a fantastic o[...]
Mar 31, 2016, by Dominique Raviart
In December 2015, we published two blogs about M&A activity in the IT services industry in 2015 (here are the links for Part 1 and Part 2). This blog examines M&A activity in IT services in Q1 2016 and sets our expectations for the rest of this year.
In short, 2016 started off with a bang, with two very large IT services acquisitions announced in the first [...]
Oct 20, 2014, by Mike Smart
NelsonHall recently attended HP’s security analyst day in London. The session provided a deep dive into HP's threat intelligence and the application of this intelligence into its security products line.
Concerns about security issues are expanding beyond CSOs/CISOs to the rest of the C suite, even commanding the attention of CEOs. HP highlighted that
Conversation[...]