Deception: Verbal Behaviour

This is the final of three posts for improving front end capacity to prevent and detect predatory physical access and programs access attacks to critical infrastructure facilitated by bogus documents. The potential of security and front line employees face-to-face with would-be attackers is often underutilized. Hereafter this article refers to security and front line employees …

Read more

Heath Care: Outside-the-System Fraud Controls

This is the last in this three part series on the financial harms posed by misuse, abuse and fraud. The last post addressed inside-the-system threats.This post concentrates on outside-the-system threats. Predation is a different cup of tea than reducing threats posed by trusted billing agents cheating a little bit. Although outside-the-system attacks may involve corrupting …

Read more

Health Care Systems: Inside-the-System Billing Abuse Controls

The current experience with COVID-19, reinforces public health and health care as an integral part of our nation’s critical infrastructure. Public and private health care insurance organizations are complex systems. These organizations are vulnerable to financial harms. This post reviews  “inside-the-system” harms.  Outside-the-system threats will be separately posted. There are times when these threats inter-relate. …

Read more

Health Care Systems: Misuse, Abuse & Predatory Fraud Controls

Health care is part of a nation’s critical infrastructure (CI). It is the largest public cash dispensing sector of the United States and Canadian economies. Ten times that of defense. Health care services delivery is an extraordinarily complex system. Within this context, conversation on misuse, abuse and predatory fraud controls must be broken down into …

Read more

About Tranzform-security

This inaugural post introduces tranzform-security. We believe in a dynamic approach to security practice at critical infrastructure (CI). We draws from science in order to extend the boundaries on how we mostly think about security. Critical infrastructures are ‘complex systems’. The human threats posed to CI manifest in two subcategories. Exogenous [outside the system] threats include acts …

Read more

Design Thinking: a foundation for Business Innovation

Submitted by PBenedicto on Wed, 02/13/2013 – 22:09 “Innovate or Die” is a popular expression among thought leaders to describe the economic and cultural climate we now do business in.  Technology’s impact on people and business continues to evolve the way we communicate, work and live at a disruptive pace.  Businesses need to respond by …

Read more

Organizational Design from the Industrial Age to the Digital Age

Submitted by rroyer on Sun, 01/13/2013 – 22:59 As the Information Age continues to evolve at a rapid rate, businesses are finding it challenging to compete in their marketplace.  New technologies, global markets, demanding customers, disengaged employees and aggressive competitors are placing unprecedented pressure on many companies, who must now rethink the way they do …

Read more

Can the Enterprise Strike Back?

Submitted by Martin Sumner-Smith on Fri, 10/12/2012 – 16:17 Most people have written-off Research in Motion (RIM) and their Blackberry platform. But then most people take a consumer’s perspective in making that assessment. RIM is making a play to its traditional strength – security. But it is considering security for both enterprises and consumers. Security …

Read more

As the pendulum swings – Users vs. the Enterprise

Submitted by Martin Sumner-Smith on Wed, 02/08/2012 – 14:07 There have been two traditional enemies of Enterprise Content Management (ECM) adoption: Email Shared network folders/drives For most users in an enterprise (i.e. staff), it is simply easier to send a file to a colleague through email than it is to first deposit the file and …

Read more

Engaging Content. Whether to Embed or Link?

Submitted by Martin Sumner-Smith on Mon, 11/21/2011 – 14:44 Showing a collection of PowerPoint slides pulled from an OpenText Content Server was the subject of a recent post. At that time, I used presentations from our Content World Users’ conference of a year ago to show how a collection of related materials from a secure …

Read more

Video at Work – Video Services for Content Server

Submitted by Martin Sumner-Smith on Tue, 11/15/2011 – 12:33 I’m a big fan of video for work applications. It’s the best way to get information to staff quickly. As such I’ve been using the OpenText Video Service (OTVS) for some time. In fact, we recently developed a ‘Success Story’ about our own use of the …

Read more