(October 09, 2017)

Risk Management Series - Part 4: Smart Technology Risk Management

From lifecycle to business impact

The establishment of a standardized technology product information data basis with current lifecycle information sets the basis for smart technology risk management. But it doesn’t end here. Let’s look again at our opening example of the CIO that is surprised by an ad-hoc need to upgrade to a new database technology. The short conversation reveals three challenges of managing technology risk.  

Read more »
(October 02, 2017)

Risk Management Series - Part 3: Navigating the Enterprise Technology Data Jungle


Up-to-date technology product information is a key input for Enterprise Architects to assess the risk of their application landscapes. From an organized approach, EAs are able to plan, manage and retire technology components in a smart way.

Read more »
(September 25, 2017)

Risk Management Series - Part 2: The Six Hidden Costs of Obsolete Technology

Read more »
(September 18, 2017)

Risk Management Series - Part 1: Proactive Technology Risk Management


As innovation drives the market, new technologies are being invented, while existing technology is being improved upon every day. Regular and frequent software updates re-engage existing users, fixes any bugs or issues, and patches problems before hackers can exploit them. Unfortunately, many companies do not know the true lifecycle of their supporting technologies and fail to process updates which leads to a great risk.

Read more »
(September 13, 2017)

Four Steps to Successful Risk Management

Technology supports and enhances almost every move we make as humans. From intricate banking procedures to shopping for groceries - every activity that we have embarked upon has been greatly influenced by technology. As the world becomes more interconnected, we also become more susceptible to risks. Just last week, one of the largest cyber attacks was announced, exposing the personal data of over 44% of the American population.

Read more »
(June 14, 2017)

Authorization and authentication with Microservices

Logging in to a website is so easy: I enter my username and password and can use the site. That's it.

What seems so simple is actually simple if the site is based on a monolithic application. But what if a website is powered by multiple microservices? How do the microservices know that a user is who s/he claims to be, and how can this be handled efficiently? The use of JSON Web Tokens can provide a secure and high-performance solution here.

Read more »
(May 17, 2017)

5 tips to prevent your system from getting infected by ransomware attacks like WannaCry

As many of you probably know, on May 12th, an international cyberattack started infecting more than 230,000 computers in over 150 countries with the worst-hit countries being Russia, Ukraine, India and Taiwan and including many others worldwide. In Europe, some of the worst hit enterprises were Telefonica, FedEx, Deutsche Bahn, Latam Airlines and parts of Britain’s National Health Service.

Read more »
(February 17, 2017)

JSON Web Tokens: How to authenticate users in a microservices environment

Logging in to a website seems to easy: Enter user name and password and you are good to go.

Read more »
(February 10, 2017)

CIOs' Top Three Priorities in 2017 – How Can Enterprise Architecture Help?

The new year has arrived and now is a good time to get familiar with the CIOs’ key strategic priorities and concerns they have in mind for 2017. The Nomura Holdings CIO Survey does just this by examining their budget priorities for this cycle.

Read more »
(October 04, 2016)

IT Security Management - an EA-driven approach with LeanIX Survey

As the requirements mentioned in our previous posts in our series on IT Security Management with LeanIX Survey clarify, a purely technical approach alone is not enough. In the current business environment, it will hardly be possible anymore to completely seal off one’s own IT landscape. Companies should instead follow a lean IT security management approach that makes it possible for them to iteratively improve their IT security:
Read more »

Subscribe to Email Updates