The number of countries with downgraded political risk ratings grew in the last year, as all five emerging market BRICS countries (Brazil, Russia, India, China, South Africa) saw their risk rating increase, according to Aon’s 2014 Political Risk Map.
As a result, countries representing a large share of global output experienced a broad-based increase in political risk including political violence, government interference and sovereign non-payment risk, Aon said.
The 2014 map shows that 16 countries were downgraded in 2014 compared to 12 in 2013. Only six countries experienced upgrades (where the territory risk is rated lower than the previous year), compared to 13 in 2013.
Aon noted that Brazil’s rating was downgraded because political risks have been increasing from moderate levels as economic weakness has increased the role of the government in the economy.
On Tuesday 18th March 2014, as part of the Business Continuity Awareness Week activities, we witnessed the first ever BC Flash Blog. This is probably a new term to most readers, it is a virtual Flash Mob – but instead of a dance routine the participants wrote and published their own blog post or article.
The event featured 22 writers, from all sectors of the BC industry – and from various corners of the globe. All the articles were on the same subject, and published at the same time. In keeping with the BCAW theme, the subject was “Counting the costs, and benefits, for business continuity”, with each writer taking their own, unique, perspective on this issue.
If you haven’t already done so, you can find links to all 22 of these blogs here. If we do nothing else, we can at least pay these writers the respect of reading their work.
CSO — Size matters when it comes to security, according to Davi Ottenhelmer. Ottenhelmer, senior director of trust at EMC, titled his presentation at SOURCE Boston Wednesday, "Delivering Security at Big Data Scale," and began with the premise that, "as things get larger, a lot of our assumptions break."
The advertised promise of Big Data is that it will help enterprises make better decisions and more accurate predictions, but Ottenhelmer contends that is placing far too much trust in systems that are not well secured. "We're making the same mistakes we've made before," he said. "We're not baking security into Big Data we're expecting somebody else to do it later on." Ottenhelmer, who is completing a book titled,A "Realities of Big Data Security," said he does defense research, and focuses on avoidance and detection. "Avoidance is the best way to escape a damaging attack," he said. "You can move data centers at real-time speeds. You can keep the old one as honeypot, and just observe what's going on with it without causing any harm. Big Data allows it now more than ever."
Study mode: Distance learning
Location: High Wycombe
As a further membership option, the BCI and Bucks New University, via their unique partnership, have designed a programme to develop and deliver this new qualification, delivered over three, ten-week distance modules.
Is this course for me?
As a further membership option, the BCI and Bucks New University, via their unique partnership, have designed a programme to develop and deliver a new qualification - the BCI Diploma. This is a 30 week, 90 credit, professional course aimed at the following prospective students:
IT partner of choice recognised for stellar 74% growth in sales of EMC products
Computacenter, Europe’s leading independent provider of IT infrastructure services and solutions, today announces that it has been named EMC Enterprise Select Partner of the Year at the EMC 2014 Business Partner Kick-off event. The award recognises year-on-year growth and excellence in collaboration with EMC. The award was presented to the team at BAFTA in London on the 25th of February. Computacenter has now been recognised with the award for three consecutive years, retaining it during 2011, 2012 and 2013.
“Closing an exceptional year for Computacenter and EMC, Computacenter nearly doubled its revenue year on year through a deeper and more integrated approach with enterprise clients,” said Kevin Sparks, UK District Manager for Service Providers, EMC. “Computacenter has embraced innovative selling across the EMC portfolio including, flash, Isilon® technology and EMC software, to existing and new clients to add business value and help to transform IT.”
Computacenter achieved 74% growth in sales of EMC products during 2013, a testament to the strength of the commercial relationship between the two organisations. Mark Chandiram, EMC Business Manager at Computacenter was also awarded the new EMC Special Recognition Award, commending him on his effort in driving EMC sales, his ability to execute and the significant part that he played in achieving positive results for both organisations.
“These awards are proof of our ability to deliver exceptional solutions to our customers whilst adding significant value to our partners,” says Neil Eke, Director, Datacenter & Storage, Computacenter. “We are delighted to be recognised for our ongoing partnership with EMC which is testament to the depth of capability we have across both sales and our delivery organisation. We look forward to continuing this momentum in 2014 and beyond, enabling users and empowering organisations.”
Computacenter is Europe’s leading independent provider of IT infrastructure services. We advise customers on their IT strategy, implement the most appropriate technology from a wide range of leading vendors and manage their technology infrastructures on their behalf. At every stage we make our customers’ businesses sharper by removing cost, complexity and barriers to change across their IT infrastructures. Our corporate and government clients are served by offices across the UK, Germany, France, the Benelux countries, Spain and South Africa. We also serve our customers’ global requirements through our extensive partner network.
IDG News Service — Much of the talk on the Web this week has focused on the Heartbleed security fiasco. Still unsure as to what's happening with Heartbleed and how it impacts you? Here's our quick-and-dirty guide.
What exactly is Heartbleed?
Heartbleed is a vulnerability in OpenSSL, an open-source implementation of the SSL/TLS encryption protocol.A When exploited, the flaw could expose information stored in a server's memory, including not-at-all-trivial things like your username, password, and other bits of personal data. Since OpenSSL is particularly popular among website administrators, a significant number of your favorite websites may be affected by Heartbleed--research firm Netcraft puts the number at half-a-million sites.
Should I panic?
Panicking is not terribly productive, and, since it involves a lot of running around like a chicken with your head cut off, potentially exhausting. That's no way to go through life. Still, this is a serious matter, and it'll require a little more action on your part than adapting a "this too shall pass" mindset.
Network World — The Heartbleed Bug, a flaw in OpenSSL that would let attackers eavesdrop on Web, e-mail and some VPN communications, is a vulnerability that can be found not just in servers using it but also in network gear from Cisco and Juniper Networks. Both vendors say there's still a lot they are investigating about how Heartbleed impacts their products, and to expect updated advisories on a rolling basis.
"Expect a product by product advisory about vulnerabilities," says Cisco spokesman Nigel Glennie, explaining that Cisco engineers are evaluating which Cisco products use the flawed versions of OpenSSL that may need a patch though not all necessarily will. That's because Cisco believes it's a specific feature in OpenSSL that is at the heart of the Heartbleed vulnerability and that it's not always turned on in products.
IDG News Service — Website and server administrators will have to spend considerable time, effort and money to mitigate all the security risks associated with Heartbleed, one of the most severe vulnerabilities to endanger encrypted SSL communications in recent years.
The flaw, which was publicly revealed Monday, is not the result of a cryptographic weakness in the widely used TLS (Transport Layer Security) or SSL (Secure Sockets Layer) communication protocols, but stems from a rather mundane programming error in a popular SSL/TLS library called OpenSSL that's used by various operating systems, Web server software, browsers, mobile applications and even hardware appliances and embedded systems.
Attackers can exploit the vulnerability to force servers that use OpenSSL versions 1.0.1 through 1.0.1f to expose information from their private memory space. That information can include confidential data like passwords, TLS session keys and long-term server private keys that allow decrypting past and future SSL traffic captured from the server.
I don’t think I’ve ever seen the reaction to an Internet security problem like the reaction I’m seeing with the Heartbleed bug. I expected to get email messages from security experts, but not the volume that has been coming in. Then I logged on to Facebook, and my feed was in pandemonium. People are totally freaked out by the news of this vulnerability, but I’m not sure which concerns them more: That their personal information may be compromised or that they are going to have to change a lot of passwords.
Let’s take a deep breath and get some points straight. I reached out to a number of experts to get their insights into this issue.
First, we should all take this very seriously. For those who may not understand what the Heartbleed bug is, the Heartbleed bug website explains it clearly:
If I had a top ten list of PR models, it would be Tesla and Elon Musk. He got a bum review in the New York Times and his damage control strategy was to demonstrate that the reviewer was less than honest. I thought no way could he win that battle. He did. The US government, typical of government-by-headline, launched a safety investigation against the cars after a battery fire caused lurid news stories. What did Tesla do? Used the opportunity to make it clear to the world just how safe their cars actually are. Lemons to lemonade. (I blogged on these stories earlier–just enter Tesla in the search on this blog).