Information Security

illustration of analysing of hand scanning on abstract background

Oracle HRMS and automation of identity provisioning

In most organizations, a primary responsibility of the Identity and Access Management group is to provision new users in Active Directory and Exchange, modify existing users, and terminate users in (almost) real-time when employees leave the organization. What is a Human Resource Management System? Human Resources departments in modern enterprises commonly leverage Human Resource Management …

Oracle HRMS and automation of identity provisioning Read More »

Minority report: Pre-crime technology has arrived

Remember the movie Minority Report, where advanced analytics and supercomputing was able to predict where the next crime would take place and a special police unit was able to arrest murderers before they committed their crime? Well, that technology is not just for Hollywood anymore. Pre-crime technologies are already here The following pre-crime technologies already …

Minority report: Pre-crime technology has arrived Read More »

AI-powered application security testing: Get the buzz on the fuzz

It can help developers create quality software and uncover bugs that other tools cannot.  Over 1,000 companies have signed up to preview it.  It’s called Project Springfield and is creating quite a buzz on fuzz testing.  Read on to get the scoop. What it is First of all, fuzz testing, or fuzzing, is essentially a …

AI-powered application security testing: Get the buzz on the fuzz Read More »

Why you should work for a company that cares about information security

Not a month goes by these days without hearing in the news about a high-profile hack attack of a major national brand. As an employee why should you care about working for a company that invests in information security? Information is the heart of any organization, and yet each year, companies stand to lose millions …

Why you should work for a company that cares about information security Read More »

Are cryptocurrencies really secure?

Crypto means hidden, or secret. When you apply that to money, it has a certain sort of appeal, doesn’t it? Well, have you heard about cryptocurrencies yet? If not, here’s my favorite definition from Investopedia. Cryptocurrency is “a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of …

Are cryptocurrencies really secure? Read More »

Security Protection Protection Privacy Seminar Conference Learning Concept

Why end-user training is critical in battle for information security

Author:  Kathryn Packer Earlier this year hackers created a number of false transfer instructions from a bank in Bangladesh to send a total of $951 Million dollars to various bank accounts worldwide. They succeeded in stealing $101 Million before the fraud was detected. How did they get into the Bank’s system? Investigators believe that it …

Why end-user training is critical in battle for information security Read More »

RSA 2016: Strategic risk management for the security-savvy enterprise

Author:  Bar Lockwood, CISA, CISM Compared to last year’s doom and gloom, the 2016 RSA Conference, held between February 29 and March 4 in San Francisco, was cautiously optimistic. Celebrating its 25th Anniversary, 40,000 participants enjoyed continuous content presented in hundreds of sessions covering nearly 30 interest areas. But certain topics drew like moths to …

RSA 2016: Strategic risk management for the security-savvy enterprise Read More »

hand presses on screen digital tablet

InfoSec 101: Accessing the internet – Safely

Author:  Jeffrey M. Jones, CISSP, CISA Even if you don’t work in the Information Technology or Information Security space, it’s important to understand the risks posed how and where you access the Internet. From hospitals to airports to departments stores to fast food restaurants, Wi-Fi access is available for free just about everywhere. But make …

InfoSec 101: Accessing the internet – Safely Read More »