- Membership
- Certification
- Events
- Community
- About
- Help
A security project, once implemented, is unlikely to meet every expectation or exactly match the design phase vision—but you certainly expect it to be close. You can’t afford—after an
… Read MoreCompanies are overlooking the very real vulnerability of cell phone call interceptions, according to a survey released in December. And it’s not the only security hole that companies often neglect
… Read MoreSecurity executives in recent years have grown more comfortable with strategic security management, the process of identifying goals, formulating policies, selecting strategies, and making continuous
… Read MoreIn today’s “hyperconnected” global business environment, cybersecurity has emerged as a major compliance challenge for controllers and other corporate leaders. Whether it’s the risk of a data
… Read MoreA "bring your own device (BYOD)" program lets employees use their own personal devices in the workplace to process financial and client data. BYOD was designed to save companies the money they would
… Read MoreOf 300 security executives included in a SDR survey, only about half said their organizations have specifically addressed social media in computer use policies (see the figure below). But there are
… Read MoreDo you know what risks your company faces if it is part of a three-party transaction and one of the players later files bankruptcy? The simple answer is that a bankruptcy trustee may avoid and
… Read MoreThe increased reliance on technology in finance and other key operational areas is putting pressure on organizations to implement security measures protecting sensitive financial data and other
… Read MorePhishing attacks are one of the most deadly risks to organizations in terms of lost business and lost revenue. When fraudsters send emails, instant messages, and other electronic communications to
… Read MoreControllers who wish to reduce the high costs of fraud would do well to look into risk-based authentication (RBA) management. “Most traditional authentication processes are inefficient and leave
… Read MoreWhat are you waiting for?