The Benefits of AI for Cybersecurity
Artificial intelligence (AI)-based cybersecurity solutions offer significant advantages with respect to threat detection, response time, and, most important, reduction in false positive alerts.
Adapting to the Changing World of Software
Many aspects of software have changed in the last few decades, particularly since the advent of personal computers in the 1980s, the World Wide Web in the 1990s, and the widespread use of mobile and cloud computing in the last decade or so. Other key changes have been the massive trend toward outsourcing and offshoring in the 2000s and the widespread use of social media beginning in the 2010s. We explore some of these trends in this Advisor.
The Cognitive Enterprise: Integrating Security and Risk Management
This Executive Update provides insights into how the cognitive enterprise can proactively protect itself from risks and security incursions by building business-driven safeguards into its underlying DNA.
Calculating PE Benchmarks at the World's First Scrum Restaurant
Recently, we described the application of Scrum at Riccardo’s Restaurant in London. This environment is similar to that of Lean hardware Scrum, in that shifts are repeatedly creating and delivering products in short cycles with high quality. Process efficiency and cycle time become the key metrics for production.
Digital Transformation Takes a Managed “Messy” Architecture
Digital transformation has hit a wall. The need for reinventing how we think about and approach architecture is becoming ever more prevalent, especially if an organization is to truly become Agile.
Business Architecture: Strategy Execution’s Secret Weapon
Aligning strategic objectives and tactical demands is critical to successfully execute your strategy and drive change. Cutter Consortium Senior Consultant Brian Cameron explores the ways you can structure your business architecture to effectively facilitate strategy execution in this on-demand webinar. (Not a member? For a limited time, you can watch the webinar on demand.)
Business Architecture: Strategy Execution’s Secret Weapon
Aligning strategic objectives and tactical demands is critical to successfully execute your strategy and drive change. Cutter Consortium Senior Consultant Brian Cameron explores the ways you can structure your business architecture to effectively facilitate strategy execution in this on-demand webinar. (Not a member? For a limited time, you can watch the webinar on demand.)
All About Agile Integration and Testing
Many Agile experts have written about integration and testing. Some debate about the goals, while others explore the tactics taken to achieve them. Most agree that integration and testing should be performed continuously and in an automated manner, if possible. However, this seems to be the extent of agreement. Debate arises over “who does the integration and testing — when, where, and why?” along with discussion about the most efficient and effective way to get the job done.
The Cutter Edge: Prepare a Security Incident Response Plan, Span the Customer/Work Gap, Fall Bookstore Sale
In this edition of The Cutter Edge, you'll explore a multi-pronged approach to creating a strategic incident response plan focusing on continuous process improvement, learn what a team has to do to span the gap between its work and the customer market, and more!
GDPR and Beyond: Data Protection and Privacy Practices
It’s clear that organizations are going to have to extend their enterprise data protection practices to be more transparent and flexible if they hope to comply with the various (changing) requirements of data protection and privacy legislation.
Statistical Project Management, Part VIII: Social and Emotional Cognition in Projects
Here in Part VIII, we discuss the social and emotional cognitive aspects of projects.
A Security Management Cycle for Cybersecurity
Cybersecurity incidents lead to huge loss or severe damage to industrial assets. To mitigate cybersecurity threats, it is essential to understand the cycle of information security governance and control: preparation, prevention, detection, response, and learning. This Advisor closely examines the security management cycle.
A Security Management Cycle for Cybersecurity
Cybersecurity incidents lead to huge loss or severe damage to industrial assets. To mitigate cybersecurity threats, it is essential to understand the cycle of information security governance and control: preparation, prevention, detection, response, and learning. This Advisor closely examines the security management cycle.
In the Digital Game, It’s the Survival of the Fittest
Digital transformation is not an end point; it is just a beginning. By going digital, your organization is only entering the game. In this Advisor, we share some laws of software evolution and the market forces at play.
Design Oscillations: Don’t “Spin Your Wheels”
The communication to design teams of new information that causes rework results in design oscillations. Since knowledge about how to complete a project is incrementally “consumed” by team members, design oscillations are a natural metabolic byproduct of knowledge-foraging behavior. Design oscillations represent the key engine of the project metabolism. The problem lies in the timing of and team cooperation in synchronization of efforts related to design oscillations.
Mapping Out a Big Picture
It may be my narrow experience, but most Agile teams I encounter develop few to no diagrams or high-level views of the architecture they’re implementing. Instead, they allude to “being Agile,” where architectural documentation is unnecessary, which implies that you simply collaborate around the code and magic (emergent architecture) occurs. In this Advisor, I suggest documentation as a good tool for striking the right balance between architecture and agility.
Propel Your Strategic Vision with Business Architecture
How can business architecture help execute strategic vision? This two-day workshop led by Cutter Consortium Senior Consultant Brian Cameron explores the ways you can structure your business architecture to effectively facilitate strategy execution.
Take a Data-Led Approach to Risk
Despite the emphasis on and investment in cyber security, traditional approaches are failing to protect businesses and their customers. In this Advisor, we explore the benefits of adopting a new, unified approach that brings together technology and risk management processes, enabling organizations to better protect themselves against cyber threats and safeguarding their businesses, data, and revenues.
Take a Data-Led Approach to Risk
Despite the emphasis on and investment in cyber security, traditional approaches are failing to protect businesses and their customers. In this Advisor, we explore the benefits of adopting a new, unified approach that brings together technology and risk management processes, enabling organizations to better protect themselves against cyber threats and safeguarding their businesses, data, and revenues.
Addressing Problem Definition in Large, Non-Software Companies
To some extent, pursuit of new technologies without a clear problem-to-be-solved is natural for basic research, such as for developing new materials. For applied R&D, defining the need to be met is essential, yet many times teams are not able to begin with a clear understanding of the user’s problem. Integrating the end customer into the team would clearly be ideal, but this is often not possible in large industrial development work (for software and non-software teams). So what’s a team to do to span the gap between its work and the customer market?
Stepping Up: Industry 4.0 in Regulated Industries
In this Advisor, we explore some of the areas in which specific Industry 4.0 technologies can create advances within regulated industries.
Is Software Eating the World? — An Introduction
In 2011, the developer of the Netscape browser and cofounder of the Silicon Valley venture capital firm Andreessen Horowitz stated that “software is eating the world.” I remember thinking at the time that this was a memorable aphorism, but while it captured the increasing importance of software, it seemed somewhat cryptic or vague. Little did I realize that, over the next 10 or so years, it would come to articulate a profound transformation of the world we live in and, especially, the enterprises we lead and operate within.
Is Software Eating the World? — An Introduction
In 2011, the developer of the Netscape browser and cofounder of the Silicon Valley venture capital firm Andreessen Horowitz stated that “software is eating the world.” I remember thinking at the time that this was a memorable aphorism, but while it captured the increasing importance of software, it seemed somewhat cryptic or vague. Little did I realize that, over the next 10 or so years, it would come to articulate a profound transformation of the world we live in and, especially, the enterprises we lead and operate within.
Unpeeling the Onion: Leveraging Flow to Create and Sustain a High-Performance Operation
In this on-demand webinar with Cutter Consortium Senior Consultant Hillel Glazer, you’ll discover what needs to be “in your center” to ensure your organization is a high-performance operation. You'll learn how to become confident in your measures, find meaning in your results, and have realism in your goals.
Unpeeling the Onion: Leveraging Flow to Create and Sustain a High-Performance Operation
In this on-demand webinar with Cutter Consortium Senior Consultant Hillel Glazer, you’ll discover what needs to be “in your center” to ensure your organization is a high-performance operation. You'll learn how to become confident in your measures, find meaning in your results, and have realism in your goals.


