Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

New technologies often present interesting challenges for security teams, with cloud services such as AWS, Azure and GCP providing particularly novel cases in comparison to “classic” on-premise systems. As cloud services race to add new fea… Continue reading Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

The potential impact of SAP security remediation

More than two thirds (68.8%) of SAP users believe their organizations put insufficient focus on IT security during previous SAP implementations, while 53.4% indicated that it is ‘very common’ for SAP security flaws to be uncovered during the audit proc… Continue reading The potential impact of SAP security remediation

Organizations not properly set up to manage risk, coronavirus pandemic reveals

Organizations’ current approach to risk governance is not sufficient to tackle the complex risk environment organizations are facing today, according to Gartner. The COVID-19 pandemic is just the latest in a line of recent risk events showing how organ… Continue reading Organizations not properly set up to manage risk, coronavirus pandemic reveals

Organizations still struggle to manage foundational security

Regulatory measures such as GDPR put focus on data privacy at design, tightening requirements and guiding IT security controls like Public Key Infrastructure (PKI). Continued adoption of IoT, cloud and mobile technologies are increasing the number of d… Continue reading Organizations still struggle to manage foundational security

Smartphone Election in Washington State

This year: King County voters will be able to use their name and birthdate to log in to a Web portal through the Internet browser on their phones, says Bryan Finney, the CEO of Democracy Live, the Seattle-based voting company providing the technology. Once voters have completed their ballots, they must verify their submissions and then submit a signature on… Continue reading Smartphone Election in Washington State

What decentralized IT spending means for the CIO role

67% of IT leaders say at least half of their spend is now controlled by individual business units, in a report from IDG Connect and Snow Software. While most believe this is beneficial for their organization, it presents new challenges when combined wi… Continue reading What decentralized IT spending means for the CIO role

AWS Previews Cloud Security Advances

Amazon Web Services (AWS) at its recent re:Invent 2019 conference previewed two tools to advance cloud security and made available a tool that promises to simplify audits. Available in preview now, Amazon Detective is a service that plugs into the AWS… Continue reading AWS Previews Cloud Security Advances

Arlo: An open source post-election auditing tool

The Cybersecurity and Infrastructure Security Agency (CISA) is teaming up with election officials and their private sector partners to develop and pilot an open source post-election auditing tool ahead of the 2020 elections. The tool, known as Arlo, is… Continue reading Arlo: An open source post-election auditing tool

Inadequate data sanitization puts enterprises at risk of breaches and compliance failures

Global enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they do, according to Blancco. Three quarters (73 … Continue reading Inadequate data sanitization puts enterprises at risk of breaches and compliance failures