ReliaQuest: Behind Enemy Lines

A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm’s assistance in paying the ransom. How should the company proceed?

Employing Dynamic Logic in Cybersecurity

A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly adept at identifying malware traffic. Now he ponders how the project might move forward, given that cybersecurity is entirely outside of his domain of … Got Hacked!

A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is not the first time this has happened. How should he recover?

Virtualization Footprint: Why Re-Invest?

Mark Dumas, a Systems Specialist at a Telecommunications Company located in South Africa needed to make decisions regarding the current virtualized infrastructure platform. These decisions also involved the renewal of hardware that had reached the end of its maintenance period and the latest virtualization platform software. Dumas further needed to formulate a plan to ensure …

LifeInsure: Choosing a Product Administration System to Manage Their Product Lifecycle

Joseph Bromer, Head of IT Solutions Delivery at LifeInsure Emerging Markets, deliberated on a challenge that he had just been given. TIBCO, a vendor supporting ObjectStar, notified LifeInsure that support for the application would cease at the end of 2017. ObjectStar was the Product Administration System (PAS) system used by LifeInsure. The ObjectStar platform was …

SiteWit Corporation: SQL or NoSQL? That is the Question!

Ricardo Lasa, CEO and co-founder of SiteWit Corporation, and his team faced a critical technology challenge in scaling the core database systems to meet rapidly escalating data volumes. Should he stick with well-known relational database technologies? Or should he re-implement core components in newer, highly distributed NoSQL databases in search of competitive advantages?