Jan 22, 2021, by John Willmott
The following is a discussion between Nagendra (Nag) P Bandaru, President, Wipro Limited – Global Business Lines-iCore, and John Willmott, NelsonHall CEO, covering lessons learned in 2020 and success factors for 2021. Nag is responsible for Infrastructure and Cloud Services, Digital Operations and Platforms, and Risk Services and Enterprise Cybersecurity – three key [...]
Jan 23, 2020, by Sven Lohse
A magnitude-6.4 earthquake struck Puerto Rico on January 6, killing one person, toppling homes and buildings, and triggering a blackout on the island that is still recovering two years after Hurricane Maria. Governor Wanda Vázquez declared a state of emergency and activated the Puerto Rico National Guard to help with recovery efforts.
How might this earthquake disaster have[...]
May 09, 2019, by Mike Smart
NelsonHall recently visited Accenture at its Cyber Fusion Center in Washington D.C. to discuss innovations in its cyber resiliency offerings and the recent launch of its new digital identity tool, Zoran.
Failings of existing role-based access (RBA)
Typical identity and access management (IAM) systems control users’ access to data based on their role, i.e. position, compe[...]
Dec 13, 2017, by Dominique Raviart
Atos has made an unsolicited offer for security, SIM cards, and payment cards technology vendor Gemalto. The offer is sizeable at €4.3bn (plus Gemalto’s net debt of €938m at end of H1 2017) financed in cash. It runs until December 15.
Gemalto is another major acquisition for Atos: in its fiscal year ended June 30, 2017, Gemalto generated revenues of ~€3bn, with an EBITD[...]
Nov 23, 2017, by Mike Smart
Mike Smart reports directly from IBM’s European Analyst & Advisory Exchange 2017 with some quick take-aways regarding IBM’s transition from systems integrator to services integrator and its business resiliency services.[...]
Nov 09, 2017, by Mike Smart
In this, the second of two articles on GDPR, I look at how IT services vendors can help companies meet GDPR compliance in several areas. You can read the first article, ‘The Impact & Benefits of GDPR for Organizations’, here.
Application services
Application services can help organizations in ensuring that new and legacy applications meet the GDPR articles perta[...]
Oct 12, 2017, by Mike Smart
In this, the first of two articles on GDPR, I look at how the regulation is set to impact companies, and at the benefits of compliance beyond simply avoiding penalties.
The EU's General Data Protection Regulation (GDPR) was adopted in April 2016 and will be put into force on 25 May 2018. The unified and enforceable laws contained in the regulation replace the o[...]
Aug 01, 2017, by Mike Smart
When NelsonHall spoke to Atos earlier in the year about its managed security services, there was a clear push to move clients away from reactive security to a predictive and prescriptive security environment, so not only monitoring the end-to-end security of a client but also performing analytics on how the business and its customers would be affected by threats. Atos’ “S[...]
Jul 18, 2017, by Mike Smart
Every day the sheer amount and complexity of cybersecurity information that security analysts are required to sift through increases. Analysts arrive at the start of each day, catch-up on recent attacks and research cybersecurity news, and are thrown into analyzing security incidents: going down the rabbit hole of reviewing data flows, finding outliers, investigating IPs, searching through both in[...]
May 16, 2017, by Mike Smart
Last Friday morning, the largest ransomware cyber attack infected an unprecedented number of machines across organizations worldwide. The ransomware named WannaCry demanded $300 in Bitcoins to be paid in three days, otherwise the ransom would double. If no payment was made after seven days, data would be deleted forever.
WannaCry ransom message
Each time this ran[...]
Nov 17, 2016, by NelsonHall Analyst
Unisys recently held an analyst and advisor day in New York, entitled UnisysNOW. However, with a relatively new leadership team in place and a broad corporate transformation underway, the focus of the event was not so much on the current shape of Unisys’ business but on the company’s aspirations and plans for achieving them, encapsulated in a new tagline: Securing Your To[...]
Jul 22, 2016, by Dominique Raviart
In an earlier blog, we described how Tech Mahindra had expanded its performance engineering testing to embrace the Internet of Things (IoT), and here we take a look at how the company is handling another area of non-functional testing: software security testing.
Tech Mahindra provides security services through its Cyber Security practice, a horizontal line of business. The practice has a headco[...]
Jul 08, 2016, by Dominique Raviart
Four years ago, at the time of the London 2012 Olympics and Paralympic Games, NelsonHall reported on the work Atos does for the International Olympic Committee (IOC) though its Major Events unit. See our previous commentary here. This week we visited its center in Barcelona to get an update on the work it is doing for the Rio Games starting next month,
The Olympic Games remain a fantastic o[...]
Nov 17, 2015, by Dominique Raviart
CSC has just laid out the financial targets of the standalone business which will retain the CSC moniker when the U.S federal company, CRSA, breaks off. As well as CSC’s global commercial business, it includes non-U.S. public sector businesses (~$700m revenues in FY15).
In its FY15 (ending March 31, 2015) this part of CSC achieved revenues of $8.1bn, and an adjusted operating margin[...]
Oct 20, 2015, by Mike Smart
IT security has never been more important, with levels of cybercrime continuing to climb and the adoption of cloud, mobile and IoT technologies increasing organizations’ ‘attack surface area’. With organizations gathering more data than ever via digitization and big data, and attackers finding ever more sophisticated ways of targeting them, both the depth and breadth of att[...]