by Orhan Yildirim | Apr 30, 2019 | Uncategorized
Coming in First: Gartner Says PAM Should Be the Top Priority for CISOs 30 APRIL 2019 By: Orhan Yildirim In a post by Gartner’s Jill Beadle, Privileged Access Management (PAM) was named the number one security project Chief Information Security Officers (CISOs) should...
by Ali Gomulu | Apr 25, 2019 | Uncategorized
Leader of the Free World Shut Down by Disgruntled Employee at Twitter: Lessons Learned 25 APRIL 2019 By: Ali Gomulu In late 2017, one of the world’s most famous and active “tweeters” – US President Donald J. Trump – was shut down for eleven minutes when a rogue...
by Mohie Ahmed | Apr 23, 2019 | Uncategorized
Data Masking for More Secure Networks and Stronger Compliance 23 APRIL 2019 By: Mohie Ahmed SQL – or Structured Query Language – was first introduced in the early 1970s and was based on the concept of accessing many records using a single command. Since then, many...
by Damla Cessur | Apr 18, 2019 | Uncategorized
Act Before it is Too Late 18 APRIL 2018 By: Damla Cessur “With great power comes great responsibility” are fictional character Ben Parker’s last words to his nephew, the soon to be famous Peter Parker, more widely known as your friendly neighborhood Spiderman. While...
by Orhan Yildirim | Apr 16, 2019 | Uncategorized
Healthcare Compliance: What Matters Most 16 APRIL 2019 By: Orhan Yildirim While we all instantly understand the motivation for cybercriminals to steal data from financial services companies, retailers, and other transaction-related businesses, it’s less obvious why...
Recent Comments