Deception: Verbal Behaviour

This is the final of three posts for improving front end capacity to prevent and detect predatory physical access and programs access attacks to critical infrastructure facilitated by bogus documents. The potential of security and front line employees face-to-face with would-be attackers is often underutilized. Hereafter this article refers to security and front line employees …

Read more

Heath Care Systems: Outside-the-System Predatory Fraud Controls (3 of 3)

This is the last in this three part series on the financial harms posed by misuse, abuse and predation. The last post explored inside-the-system threats. This post explores outside-the-system threats. Predation is a different cup of tea than reducing threats posed by trusted billing agents being careless with resources or cheating a little bit. Although …

Read more

Health Care Systems: Inside-the-System Billing Abuse Controls (2 of 3)

This is the second of a three part series of articles addressing misuse, abuse and predatory practices causing financial harms to health care systems. This post explores “inside-the-system“ financial harms.  The third in this series will review “outside-the-system” harms. The reference to “systems” is important.  Becoming effective and controlling financial harms will require a system …

Read more

Health Care Systems: Misuse, Abuse & Predatory Fraud Controls (1 of 3)

Health care is an integral part of a nation’s critical infrastructure (CI). It is the largest public cash dispensing sector in the United States and Canadian economies. Ten times that of defense. Health care services delivery is an extraordinarily complex system. Within this context, conversation on misuse, abuse and predation (fraud) controls must be broken …

Read more

About Tranzform-security

This inaugural post introduces tranzform-security. We believe in a dynamic approach to security practice at critical infrastructure (CI). We draws from science in order to extend the boundaries on how we mostly think about security. Critical infrastructures are ‘complex systems’. The human threats posed to CI manifest in two subcategories. Exogenous [outside the system] threats include acts …

Read more

Design Thinking: a foundation for Business Innovation

Submitted by PBenedicto on Wed, 02/13/2013 – 22:09 “Innovate or Die” is a popular expression among thought leaders to describe the economic and cultural climate we now do business in.  Technology’s impact on people and business continues to evolve the way we communicate, work and live at a disruptive pace.  Businesses need to respond by …

Read more

Organizational Design from the Industrial Age to the Digital Age

Submitted by rroyer on Sun, 01/13/2013 – 22:59 As the Information Age continues to evolve at a rapid rate, businesses are finding it challenging to compete in their marketplace.  New technologies, global markets, demanding customers, disengaged employees and aggressive competitors are placing unprecedented pressure on many companies, who must now rethink the way they do …

Read more

Can the Enterprise Strike Back?

Submitted by Martin Sumner-Smith on Fri, 10/12/2012 – 16:17 Most people have written-off Research in Motion (RIM) and their Blackberry platform. But then most people take a consumer’s perspective in making that assessment. RIM is making a play to its traditional strength – security. But it is considering security for both enterprises and consumers. Security …

Read more

As the pendulum swings – Users vs. the Enterprise

Submitted by Martin Sumner-Smith on Wed, 02/08/2012 – 14:07 There have been two traditional enemies of Enterprise Content Management (ECM) adoption: Email Shared network folders/drives For most users in an enterprise (i.e. staff), it is simply easier to send a file to a colleague through email than it is to first deposit the file and …

Read more

Engaging Content. Whether to Embed or Link?

Submitted by Martin Sumner-Smith on Mon, 11/21/2011 – 14:44 Showing a collection of PowerPoint slides pulled from an OpenText Content Server was the subject of a recent post. At that time, I used presentations from our Content World Users’ conference of a year ago to show how a collection of related materials from a secure …

Read more

Video at Work – Video Services for Content Server

Submitted by Martin Sumner-Smith on Tue, 11/15/2011 – 12:33 I’m a big fan of video for work applications. It’s the best way to get information to staff quickly. As such I’ve been using the OpenText Video Service (OTVS) for some time. In fact, we recently developed a ‘Success Story’ about our own use of the …

Read more