Blog Posts Tagged with "Security Risk"

4238fc46fe869de66700ec14d6738248

Securing the BYoD Workplace

November 28, 2018 Added by:Scott Gordon

A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.

Comments  (0)

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)

53c787f0dd688c758b5610aa09af8f13

How Secure Are Popular Finance Apps on Google Play?

September 04, 2018 Added by:Min Pyo Hong

Analysis of the top free Android finance apps on Google Play revealed critical, medium and low security vulnerabilities.

Comments  (0)

2d356835f3abb8f341fe23f58a2b4fd6

Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)

9e7aeef1ac24eb6d85ff02ae2d29b117

#NCSAM: Third-Party Risk Management is Everyone’s Business

October 17, 2017 Added by:Scott Schneider

This post explores one of the weekly themes for National Cyber Security Awareness Month, “Cybersecurity in the Workplace is Everyone’s Business.”

Comments  (0)

5ad5c9808e863169a36cd3b7c535d72b

Convenience vs. Control: Achieving the Right Security Balance

May 12, 2017 Added by:Kevin Cunningham

By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.

Comments  (0)

0691ab2a89db6dae5b9845dee3dd63a4

Cloud Email Applications Could Put Your Corporate Data at Risk

April 12, 2016 Added by:Yotam Gutman

Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information

Comments  (0)