Blog

Latest and greatest about IT and SAP security

GDPR is around the corner. Are companies really prepared?

A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered.

read more

Companies realize that they are unprepared for DGPR

Why should enterprises simplify timely provision of data?
The General Data Protection Regulation (GDPR), which will be enforced from May 2018, requires companies to localize and provide personal data on request to clients and users within a short period of time. This would, essentially mean that, within 30 days, an applicant should have a copy of his or her data in order to be able to decide on its use, if necessary.

read more

Dark Web augments insider threat for organizations

The Dark Web is considered a trading place for all kinds of illegal goods and cannot be viewed through ordinary search engines. In addition to criminals, whistle blowers, political dissidents and increasingly disgruntled ‘insiders’ use this anonymity to their advantage.

read more

What does Design Thinking have to do with Data Security?

Have you heard of the concept called Design Thinking? Yes? No? Okay. Its evangelists define it as “a proven and repeatable problem-solving protocol that any business or profession can employ to achieve extraordinary results.” In other words it’s a very methodical...

read more

5 Steps to Implement a Successful Data Classification Policy

Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into every day business activities. However, many companies fail to...

read more

Beware of the Gap!

Security. This word is, more often than not, misunderstood than understood. And this issue stems from a lack of understanding of the threat environment. Threat, in any form, strikes from obviously unforeseen and seemingly innocuous sources. The World Wide Web is...

read more

Protecting Corporate Information in the SAP Data Security Space

While business-critical data stored in a SAP system is sufficiently protected inside the secure boundaries of the SAP system, it becomes exposed when users extract the information from those SAP systems for reporting and sharing. Everyday, unprecedented volumes of...

read more