Cyberattacks – What you can’t see can hurt you.
Why is Technology GRC so difficult? “There are only two types of companies: those that know they’ve been compromised, and those that don’t know.” I am sure you have heard…
Why is Technology GRC so difficult? “There are only two types of companies: those that know they’ve been compromised, and those that don’t know.” I am sure you have heard…
Why do Enterprises Struggle with Technology Compliance? In the last year, I have talked to leaders such as CXOs, VPs, Technology Heads and CISOs in medium and large organizations to…
As a provider of software solutions and in recent years hosting them on the cloud, we follow security standards diligently. In fact, that is a part of our deliverables to…
In IT compliance, control over data sharing is a major preventive step against accidental or intentional data breaches. Here are a couple of cases that could have been avoided with…
Major public-facing companies have fallen victim to unauthorized individuals gaining access to sensitive data. Here are three famous cases which describe on the result of an authorized person gaining access…
How is it that when I buy insurance or make a financial transaction, I immediately begin receiving contacts from companies offering similar products and services? They know me, my email…