Forecasting the future - or more precisely, attempting to forecast the future - is an exercise as old as mankind itself. The ancient Greek and Roman civilizations, for example, engaged in all kinds of rituals and propitiatory sacrifices to ensure good fortune in their future endeavors. Back then, as it is still today, there were all sorts of individuals whose role was to "peer into the future" for the benefit of the uninitiated. More often than not, these foretellers offered up more questions than answers.
February 2006
February 2006
"Development is about delivering value through the proper management of projects; governance is about managing portfolio resources and funding the right projects at the right time."
- William B. Walton, Guest Editor
In this issue:- The Role of Strategy, Planning, and Budgeting in an Agile Organization
- The Role of Strategy, Planning, and Budgeting in an Agile Organization: Opening Statement
- Investing in Agile: Aligning Agile Initiatives with Enterprise Goals
- Agile Strategies for a Dynamic Environment
- Get Real with Strategic Budgeting
- Agile Strategies for a Dynamic Environment
- Coping with the Unexpected: Integrating HRO and Agile
January 2006
"Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."
In this issue:- Securing Cyberspace: Is It Time to Rethink Our Strategy?
- Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement
- Cyber Risk Management: The Need for Effective Public and Private Partnership
- Investing in Cyber Security: The Path to Good Practice
- Securely Sustaining Software-Intensive Systems
- Authentication Mechanisms You Can Bank On
- Contribution: Security and Identity Management at Tata Consultancy Services
- Are We Ready to Face Next-Generation Spam?
January 2006
In the last issue of CBR, we focused on an important and timely topic: security and IT risk management.There I made the case for why the "uninitiated public" has a strong incentive to care about security: "The increasing prevalence of computer systems as well as the growing amount of our personal data that is stored by business firms, nonprofit organizations, and governmental entities (and can therefore be compromised) suggests that even the uninitiated public should pay attention." But, as we learn from our experts in this installment of CBR, our personal data being compr
December 2005
Viruses, Trojan horses, worms, time bombs, adware, spyware, keystroke tracking tools, spoofing, snooping, sniffers -- these are some of the most popular examples of malicious code and techniques that modern organizations find themselves fighting. Couple this seemingly unabated tide of new releases and new forms of harmful software with human threats like crackers, thieves, industrial espionage contractors, and your own disgruntled or ill-intentioned employees, and what do you get? You get a complex cocktail of potential security headaches. How big a headache?
In this issue:- Security and Risk Management: The Never-Ending Game of Chess
- Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk?
- Information Security -- A Difficult Game: Things to Think About When Planning Your Next Move
- Security: A Game Worth Playing
- IT Risk Management/Security Survey Data Collected by Cutter Consortium