Latest and greatest about IT and SAP security
The rapid change in the development of enterprise IT architecture in the context of the digital transformation has led to a significant shift in application integration and data distribution models. As a result, applications too exchange sensitive data based on protocol. This is in addition to exchanges between users – internal and external. To effectively protect intellectual property and personal data, and thus, to meet the requirements of the new European Data Security regulation – GDPR, new solutions need to be considered.read more
Does your organization use Microsoft AIP to protect critical documentation and files? Do all your employees use it effectively? What stops them? Is it because they feel that the extra effort of applying a protective layer hampers their workflow? Too many questions, right? Here is a solution.read more
On 24th July, NBC News published a rather statistic heavy report by ITRC that presented a paradoxical picture. While on one end, the frequency of data breach in the US has “jumped 29% in the first half of this year”, on the other “cyber security still doesn’t get the respect it deserves”. Strange, but true!read more
A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered.read more
Why should enterprises simplify timely provision of data?
The General Data Protection Regulation (GDPR), which will be enforced from May 2018, requires companies to localize and provide personal data on request to clients and users within a short period of time. This would, essentially mean that, within 30 days, an applicant should have a copy of his or her data in order to be able to decide on its use, if necessary.
The Dark Web is considered a trading place for all kinds of illegal goods and cannot be viewed through ordinary search engines. In addition to criminals, whistle blowers, political dissidents and increasingly disgruntled ‘insiders’ use this anonymity to their advantage.read more
Have you heard of the concept called Design Thinking? Yes? No? Okay. Its evangelists define it as “a proven and repeatable problem-solving protocol that any business or profession can employ to achieve extraordinary results.” In other words it’s a very methodical...read more
Touching lives at every milestone The Banking and Financial Services Industry is perhaps the only industry that touches lives consistently. The reason is simple. Banking is about money and, by logical extension, commerce. When every aspect of human life - birth,...read more
Have you read the recent article by Warwick Ashford (Security Editor, ComputerWeekly.com) (1) on the settlement that US retail giant Target paid for the 2013 data breach? Well, on records, it summed up to $220 million including legal fees and other associated costs....read more
Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into every day business activities. However, many companies fail to...read more
Security. This word is, more often than not, misunderstood than understood. And this issue stems from a lack of understanding of the threat environment. Threat, in any form, strikes from obviously unforeseen and seemingly innocuous sources. The World Wide Web is...read more
While business-critical data stored in a SAP system is sufficiently protected inside the secure boundaries of the SAP system, it becomes exposed when users extract the information from those SAP systems for reporting and sharing. Everyday, unprecedented volumes of...read more