Latest and greatest about IT and SAP security
A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered.read more
Why should enterprises simplify timely provision of data?
The General Data Protection Regulation (GDPR), which will be enforced from May 2018, requires companies to localize and provide personal data on request to clients and users within a short period of time. This would, essentially mean that, within 30 days, an applicant should have a copy of his or her data in order to be able to decide on its use, if necessary.
The Dark Web is considered a trading place for all kinds of illegal goods and cannot be viewed through ordinary search engines. In addition to criminals, whistle blowers, political dissidents and increasingly disgruntled ‘insiders’ use this anonymity to their advantage.read more
Have you heard of the concept called Design Thinking? Yes? No? Okay. Its evangelists define it as “a proven and repeatable problem-solving protocol that any business or profession can employ to achieve extraordinary results.” In other words it’s a very methodical...read more
Touching lives at every milestone The Banking and Financial Services Industry is perhaps the only industry that touches lives consistently. The reason is simple. Banking is about money and, by logical extension, commerce. When every aspect of human life - birth,...read more
Have you read the recent article by Warwick Ashford (Security Editor, ComputerWeekly.com) (1) on the settlement that US retail giant Target paid for the 2013 data breach? Well, on records, it summed up to $220 million including legal fees and other associated costs....read more
Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into every day business activities. However, many companies fail to...read more
Security. This word is, more often than not, misunderstood than understood. And this issue stems from a lack of understanding of the threat environment. Threat, in any form, strikes from obviously unforeseen and seemingly innocuous sources. The World Wide Web is...read more
While business-critical data stored in a SAP system is sufficiently protected inside the secure boundaries of the SAP system, it becomes exposed when users extract the information from those SAP systems for reporting and sharing. Everyday, unprecedented volumes of...read more