Real-world approaches to a complex problem
Before embarking on a role management project, take time to consider your business objectives and project scope, says Jackie Gilbert, founder and VP of marketing, SailPoint.
Before embarking on a role management project, take time to consider your business objectives and project scope, says Jackie Gilbert, founder and VP of marketing, SailPoint.
Global companies face a significant cultural and legal challenge when dealing with security across international borders, says James Ritchie, former principal auditor, Integralis.
As long as there has been credit granting there have been customers committing first party fraud, says Jasbir Anand, Actimize, Inc.
What are the consequences when an employee’s role changes within an organization?
A growing number of organizations in the retail and financial services industries are recognizing the benefits of implementing and adhering to the Payment Card Industry Data Security Standard (PCI DSS).
Business process outsourcing (BPO) is a common practice these days, but the benefits of BPO also come with an increase in risk. This requires a new way of looking at data security — as an “inside-out” threat environment – that is, from the data core out and as a problem of insiders that needs to be monitored. Here is a primer for dealing with the security challenges posed by BPO.