25 Must-Read Blogs for CIO’s

CIO stands for many different things. The “I” can stand for Information, Innovation, Integration, Infrastructure, and the title differs from one company to another. Much like the title, the responsibilities vary widely, but they are always several and weighty. The position requires skills and knowledge from different fields, as the CIO sets the technological direction of the company, manages IT projects, supervises team, etc. Blogs written by peers and experts in related fields are a great source of inspiration and [...]

How to Simplify Security for Your AWS and Cloud Servers?

How to Simplify Security for Your AWS and Cloud Servers

If there is one good thing that came out of the recent cyber-attacks, it is the fact that more companies are becoming focused on cyber security. For some of them, such as Target, Sony, LinkedIn, and Verizon, security was an afterthought until they got burnt. Others decided that prevention is better than the cure and that issues caught by their users are more threatening than those caught internally. We all know that cyber-security is a process that takes time, and [...]

17 Amazing Blogs on Insider Threats You Should Be Following

17 Amazing Blogs on Insider Threats You Should Be Following

After a string of concerning news about some of the world’s biggest brands falling victim to cyber attacks (Insider Threats?), it’s only natural to devote a great majority of your security budget to defending your business from outsider threats. After all, if hackers can penetrate the gates of companies like Sony Pictures, Target, or the University of Calgary, then it should be evident that you must focus on hardening your security from the outside-in, right? Wrong. While cyber attacks are a [...]

Strategies for a CISO to Prevent Insider Threats

Strategies for a CISO to Prevent Insider Threats

Insider threats are on the rise, and it's still a large security flaw in most systems. It's especially common in small businesses that grow to medium-sized enterprises where old employees are trusted and permissions across the network are globally loose. As a CISO, your responsibility is to rein in these security flaws and protect the enterprise from data loss and theft. Before you think your organization is safe, studies show that insider threats are bad and getting worse. Many [...]

Who changed the router settings? Easy Accountability for Shared Access!

Who changed the router settings? Easy Accountability for Shared Access!

Who changed the settings on the router? Who changed the password on the SFDC account? Who changed language settings on the service? Who... who.. who... a never ending stream of important questions. The move to the cloud Why do these questions come up in enterprises? After all aren't we using sophisticated account management practices, tied in to Active Directory and more. The answer lies buried beneath the surface of modern day SaaS applications, although what we are discussing here is hardly [...]

Making FFIEC cybersecurity compliance simpler for Banks

Making FFIEC cybersecurity compliance simpler for Banks

Making FFIEC cybersecurity compliance simpler for Banks. FFIEC stands for the Federal Financial Institutions Examination Council. The Federal Financial Institutions Examination Council (FFIEC) was established on March 10, 1979, pursuant to title X of the Financial Institutions Regulatory and Interest Rate Control Act of 1978 (FIRA), Public Law 95-630. In 1989, title XI of the Financial Institutions Reform, Recovery and Enforcement Act of 1989 (FIRREA) established The Appraisal Subcommittee (ASC) within the Examination Council. Quoting from [1] - The FFIEC [...]

Credit Union Banks and NCUA IT Compliance

Credit Union Banks and NCUA IT Compliance

Credit Union Banks are a lifeline for this country and for many people internationally. There are more than 6000 credit union organizations who service more than 100 million people, out of whom at least 45% are economically active. This means that credit union banks play a very important role in the economy and touch the lives of nearly a quarter of the population of the US, if not more. Given that Credit Unions play a vital role in the economy [...]

Securing Access to your Cloud Apps

Securing Access to your Cloud Apps

Securing Access to your Cloud Apps should be simple. For pure efficiency SaaS seems to be the universal answer.  It eliminates the expense of power, maintenance, environmental controls, maintaining parallel backup sites, and a massive IT staff. BYOD (Bring Your Own Device) strategies have led to disruptive incompatibilities when people are creating files.  A Mac™ user has difficulty sharing documents and files with a Windows™ or BlackBerry™ user, and vice versa.  Access to company data by tablet or phone [...]

The 10 Biggest Issues the CISO Faces

The 10 Biggest Issues the CISO Faces

A chief information security officer (CISO) is the senior-level official inside an association in charge of setting up and keeping up the undertaking vision, system, and projection to guarantee data resources and advancements are enough ensured. The CISO coordinates staff in identifying, creating, executing, and keeping up procedures over the venture to diminish data and data technology (IT) dangers. They react to occurrences, set up suitable standards and controls, oversee security advances, and direct the foundation and execution of [...]

Cloud-Based Management Makes the Difference

Cloud-Based Management Makes the Difference

A majority of the front-end services we interact with on a daily basis utilize cloud-based resources. With such popularity, we must not only gain an understanding as to why this is, but also if we are to consider it for our own implementation. In this blog we delve into the ease of use of cloud-based privileges along with how they work at the enterprise level. Implementation Converting previously internal hosting and IT infrastructure to externally hosted resources is no [...]