Governance Risk & Compliance (GRC)

Back to Topic page

New Era of Enterprise Mobility (Part 2)

Business to consumer interaction will be the biggest game changer. More than half-a-million applications across the web and various portals, which can be accessed over mobile and tablet, will consume data and bandwidth and will create a new social structure. Social networks, Google, voice, Internet, gaming and chat are now ...

Banning Mobiles at Work in the Age of BYOD and Digital

A known Enterprise (name withheld) has banned employees across all its group companies from using mobile phones in office. On July 30, it was extended to offices of all group companies, including.... The thinking behind the move, according to an employee (who did not want to be identified), is that ...

Are You Avoiding Risk or Managing Risk?

I just read a great article over on the Mckinsey & Company blog titled "Building a bridge from CMO to CIO" where Matt Jauchius, EVP and CMO of Nationwide, describes his approach to working with the CIO of the company.    I encourage you to jump over there and read ...

The Price Tag of Losing Data: Infographic

That data breaches can have significant impact on the organization experiencing it is a fact well understood by both the management and CIO team. If nothing else, the Target breach has at least taught businesses that none will be spared, not even the CEO. But, beyond the CIO/CEO resignations, loss ...

Better test your systems rather than test your customer's patience!

The Flipkart episode finally got me back into blogging mode. I am sure they must have tested their IT Systems before going into the big sale day. I wonder what tests were done to assess uptime and availability capabilities they carried  for this Mother Of All Events.I remember way back in 2005 I ...

Commercial Mobile Apps Can Sneak Out Corporate Data

Presenting his keynote at DynamicCIO's Mobile Security Summit, Capt Felix Mohan, Chief Knowledge Officer at The CISOacademy, identified 'Applications' along with 'Data/Content' as the top-most priority in securing the mobility environment, with the device and networks relegated further down. A few weeks later Gartner announced that through 2015, over 75 ...

Securing the Next Generation Digital Enterprise: Focus on Innovation

Across industry, we are witnessing the transformation of the enterprise information management model. This transformation of the enterprise information management model has consequences. Enterprises must focus on managing risk, while developing new enterprise operating models that optimize investments and enables the business. New opportunities bring new risks, as the model ...

Average Enterprise Generates 10,000 Security Events Per Day

According to findings in Damballa's Q1 2014 State of Infections Report, the average enterprise generates as many 10,000 security events per day, many of which require manual analysis to determine if there are early indicators of a compromise of systems. "Such figures illustrate how daunting it is for security staff to ...

Snowden Leaks Preventing Enterprises from Moving to the Cloud:Infographic

Edward Snowden revelations continues to make headlines--and raise eyebrows even after nearly a year since the computer analyst whistleblower provided the Guardian with top-secret documents of covert data gathering and cyber-surveillance programmes carried out by the National Security Agency (NSA), the UK's GCHQ and other intelligence services.The revelations hit ...

Enterprise Security: A Management Perspective

An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological analysis shows us otherwise i.e. most of the enterprises shy away from scanning and patching their business critical infrastructure in a fear of interrupting their already ...

One-Fifth of All Malware Ever was Created in 2013

A recently released report that analyzed the development of malicious code indicates that in 2013 as many as 30 million new strains of malware were introduced, an average of about 82,000 new variants each day last year, and accounted for one-fifth of the 145 million malware samples ever created. "These numbers -which ...

Security Skills and Personnel Gap Creates National Security Crisis

The growing cybersecurity skills and personnel gap that makes recruiting and retaining personnel with the prerequisite expertise increasingly difficult for both the public and private sectors may have reached a point where it has become "a national security crisis," according to a statement from Art Gilliland, SVP and general manager, Enterprise Security ...

RFID Takes a Ride with NH Goel World School Students

Obtaining a safe transport for their children is of paramount importance for all parents. Imagine the trauma experienced by a six year old who thought he was going home in his school bus only to find himself in the bus parking lot hours later. Visualize the intense pain that parents ...

Will the Framework for Improving Critical Infrastructure Cybersecurity Succeed?

The National Institute of Standards and Technology (NIST) has released the first version of the Framework for Improving Critical Infrastructure Cybersecurity, which was developed with the aid of several thousand security experts. The Framework initiative was prompted by President Obama's Executive Order issued in February of 2013, and is designed to ...