Target Data Breach
How did they pull it off and how can you safeguard your environment from a similar event? The Target Stores data breach started by exploiting a vulnerability in an externally facing webserver. Once...
View ArticleA Sobering Day for All CEOs
Sadly, the CEO presiding over Target during the recent data breach resigned today. See USA today article. This series of unfortunate events for Target begs a key question relating to the risks every...
View ArticleOracle Identity and Access Management with EM12c: Red Pill or Blue Pill?
It seems all too often that when users are unable to access an end-user business function protected by a IDAM (Identity and Access Management) solution, the IDAM system gets the brunt of the blame and...
View ArticleLeadership Essential in Cybersecurity Dynamics
Are your C-level leaders sending a clear message about Cyber Security? Despite the high profile security breaches making news headlines and increased attention around cyber risks, executives in the...
View ArticleWith today’s increasing Mobile Enterprise Security Threats, do you have a...
Corporations are increasingly utilizing mobile enterprise systems to meet their business objectives, allowing mobile devices such as smart phones and tablets to access critical applications on their...
View ArticleStart With The End In Mind: Blog #6 – Eliminate Audit Deficiencies and...
(Source: SailPoint Technologies, Inc. Identity and Access Management Buyers Guide) Identity management is a focal point for IT audits and one of the areas most commonly flagged for ineffective...
View ArticleFive Ways To Spot a Phishing Email
Think you’re clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we’ve put together this list of clues to...
View ArticleWhy All The Emphasis On Insider Threats? Three Reasons:
1. Insider security risks are more prevalent and potentially more damaging. According to a study conducted by the Ponemon Institute, 34% of data breaches in the U.K., come from malicious activity,...
View ArticleFull Report – 2019 Data Breach Investigations Report (Verizon)
Please access your full report here. 2019-data-breach-investigations-report
View ArticleHow To Instantly See Privileged Account Compromise Or Abuse
IT and System Admins along with security professionals know that safeguarding access to privileged accounts throughout an enterprise is critical. With up to 80% of breaches involving a compromised...
View Article
More Pages to Explore .....