Intensifying Cybersecurity Fears Could Fuel Blackberry Rebound

Sometimes there’s a temptation to think that cyberattacks are an unfortunate consequence of our ever-increasing interconnected digital world, which is underscored by the fact that most Americans walk around with a personal computer in their pocket. Cyberattacks, however, are nothing new.

In 1999, the so-called Melissa virus infected Microsoft Word documents and wreaked havoc on business and personal computers powered by Windows worldwide. It caused an estimated $80 million in damage and was the impetus behind the sales boom in anti-virus software, which has gained near universal acceptance since. Shortly after that, in 2000, a hacker dubbed Mafiaboy unleashed a series of distributed-denial-of-services (DDoS) attacks on a string of consumer sites, including Amazon, eBay, E*TRADE and Yahoo!, at the time the no. 1 search engine in the world. The blitz resulted in over $1 billion in damage.

Still, there’s no question that cybersecurity concerns have become more acute more recently. In all, cybersecurity lapses cost the global economy $450 billion last year and will exceed $2 trillion by 2021, according to estimates. That suggests that companies getting ensnarled in a hacking incident is as much an inevitability as it is a risk. The fallout will paralyze some businesses and entail massive PR problems (It took Target years to overcome the breach that took place during the holiday shopping season a few years ago), while for others the implications will be far worse.

Not surprisingly, then, the market for cybersecurity goods and services is expected to expand rapidly in the years ahead. According to the research firm Cybersecurity Ventures, global spending in this area will grow, year-over-year, by 12% to 15% until 2021, when it’s expected to exceed $1 trillion. This would seem to spell good news for cybersecurity firms such as FireEye, Symantec and Palo Alto Networks.

A more under-the-radar beneficiary, though, could be Blackberry. The company’s past troubles are well documented. It’s essentially the Blockbuster Video of smartphones, once controlling more than 50% of the market, only to see their dominant position implode once Apple and Alphabet developed superior operating systems. Blackberry has since shunned its hardware business entirely, announcing last year that it will focus on enterprise software and the emerging internet of things (IoT) industry.

As part of this evolution, the company last month launched a cybersecurity consulting division, the culmination of a fresh round of strategic acquisitions that beefed up its expertise in the area. In many ways, this is a natural evolution for Blackberry, which has long been a leader in encryption services. For years, it was the preferred handset provider for US government officials who trafficked sensitive information, including White House staff, members of Congress and the intelligence community, thanks, in part, for its reputation for successfully securing devices.

Click here to continue


The importance of Design of Experiments (DoE)

Design of Experiments (DoE) is an important component in many industries. It is a series of tests or runs that is carried out repeatedly and consistently over a period of time, and its outputs or responses, observed. Design of Experiments is very important in industry to help arrive at an understanding of the predictability and reproducibility of an experiment.

Design of Experiments is a very important aspect of the important elements of a product, such as quality, reliability and performance. What Design of Experiments does is that it helps to examine and investigate the inputs that lead to poor quality. This insight leads the entity carrying out the Design of Experiments to use these to improve their quality standards.


Ruling out chance

Design of Experiments does not rely on chance or providence to bring about the quality that is required of an experiment. It arrives at the optimal set of procedures that are needed to get the required quality standards after a series of tests and experiments, so that the final result shows in the process that goes into the product.

Fundamentally, Design of Experiments helps to put in place a system of control for a product. All the ingredients that go into the inputs needed for obtaining a product of a defined standard or quality are scientific and precise. This precision and accuracy is arrived at after carrying out as many runs or series of Design of Experiments as needed to finally arrive at it.

An introduction to Design of Experiments

The ways of understanding Design of Experiments and applying their standards into production will be the topic of a webinar that is being organized by Compliance4All, a leading provider of professional trainings for all areas of regulatory compliance. At this webinar, the speaker, William Levinson, an ASQ Fellow, Certified Quality Engineer, Quality Auditor, Quality Manager, Reliability Engineer, and Six Sigma Black Belt, who is the principal of Levinson Productivity Systems, P.C., will explain the fundamentals of Design of Experiments.

To gain a proper understanding of the principles of Design of Experiments and to get a grasp of how to implement this concept into your systems, please register for this webinar by logging on to

An understanding of the significance level in hypothesis testing

William will make participants understand how to use Design of Experiments to identify and rule out the particular item or input that affects quality. The concept of significance level in hypothesis testing, which will serve as a basis for not only DoE, but also Statistical Process Control and acceptance sampling, will be explained.

A description of the other uses of DoE, such as supporting Corrective and Preventive Action (CAPA) and in process improvement, where it helps to identify and optimize the factors influenced by Critical to Quality (CTQ) characteristic, will be part of the learning that is on offer at this webinar.



Levinson will cover the following areas at this webinar:

·        Economic benefits of DOE

·        Hypothesis testing: the foundation of DOE, SPC, and acceptance sampling

o  Null and alternate hypothesis

o  Type I or alpha risk of concluding wrongly that the experiment differs from the control (or that a process is out of control, or that an acceptable production lot should be rejected)

o  Type II or beta risk of not detecting a difference between the control and the experiment, not detecting an out of control condition, and accepting a production lot that should be rejected

·        Factors, levels, and interactions

o  Interaction = “the whole is greater or less than the sum of its parts”. One variable at a time experiments cannot detect interactions.

·        Randomization and blocking exclude extraneous variation sources from the experiment.

·        Replication means taking multiple measurements to increase the experiment’s power.

·        Interpret the experiment’s results in terms of the significance level, or quantifiable “reasonable doubt” that the experiment differs from the control.

Elements of a Cyber Security Incident Response Program

A Cyber Security Incident Response Program (CSIRP) or a Cyber Security Incident Response Team (CSIRT) that anticipates and neutralizes a cyber-incident is a critical need for organizations, because an Internet or network security breach results in loss of valuable data, as well as several resources and the organization’s reputation and could potentially invite lawsuits.

While putting a CSIRP in place; the management has to take into consideration the fact that Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. It has to decide who in the organization has the key responsibility towards developing an information security governance program. It has to also review existing Information Security policies and standards to gauge their sufficiency vis-à-vis industry best practices, and update them as needed, while meeting the requirements set out by compliance regulations.

A webinar to help understand CSIRP

The effective ways of doing this will be the focus of a webinar that is being organized by Compliance4All, a highly popular provider of professional trainings for all areas of regulatory compliance. Dr. (Ms.) Michael Redmond, CEO and Lead Consultant for Redmond Worldwide, who served as an Adjunct Professor for Continuity Management at New York University and the Master’s program at John Jay College, will be the speaker at this webinar. More details of this course can be had from

Scope of the training session

Ms. Redmond will teach participants of this webinar the ways by which their organizations can put a CSIRP in place. She will help them establish Key Performance Indicators (KPI) to determine if their CSIRP meets business objectives and operational metrics for effecting process improvement. She will also show participating organizations the ways of tailoring and enhancing their existing CSIRP and requirements for specific audiences based on the sensitivity of the information for which they are granted based on policies.

Other important learning outcomes offered at this session include how to strengthen IT Risk Management, which involves integrating information security risk management with Enterprise Risk Management and requires using common business terminology, congruent methods, and common or linked risk register, and establishing mechanisms for risk acceptance. Ms. Redmond will also explain to participants how they can build an IS regulation review process, schedule regulation requirements and put in place a set of procedures that help to deal with a breach, malware and related issues.

What are the functions of computer system validation process?

Computer system validation process is described as the documented procedure which assures that a computer system performs the exact functions it is intended to reproducibly, consistently and verifiably. The computer system validation process covers every function and milestone of the computer system:

  • Development of the system
  • Operation of the system
  • The system’s maintenance
  • Its retirement
  • Archiving it

Documenting the computer system validation process is of critical importance, since this is what establishes that the computer system validation process is meeting its intended purpose.

The need for a computer system validation process

The computer system validation process is necessary for a number of important reasons:

The computer system validation process requirements

The organization carrying out the computer system validation process must do so keeping in mind its responsibility, which covers the following areas:

  • Standard Operating Procedures (SOPs)
  • Assessment of the inventory relating to the computer
  • Validation protocols that are specific to the system
  • Documentation of the validation protocols

In which areas is the computer system validation process necessary?

The computer system validation process is necessary to determine if the system requires to be validated for the following:

Computer system validation process relating to the hardware and software

The hardware and software are two important sections in which computer system validation process is needed. Good business practice requires that the organization designate a person entrusted with ensuring compliance with the computer system validation process for the hardware and software parts of a computer system.

Chalking up the Validation Master Plan

The computer system validation process gets crystallized into what is called the Validation Master Plan (VMP). This VMP consists of a plan to carry out the computer system validation process and includes:

  • Locating the set components during the validation process
  • Ranking and arranging the tasks according to their importance
  • Assigning responsibilities to the team
  • Identifying and forming procedures that are peculiar to the computer system validation process of the facility.

Steps for computer system validation process

The computer system validation process requires the following steps:

This link  has more on this topic for your reference