How to Streamline and Integrate Security Operations?

Today’s security teams are flooded with multiple feeds of information and analytical methods. In parallel, attackers make use of various vulnerabilities and continuously target critical business services, infrastructure and employees. In order to accomplish and manage appropriate protection, security and IT operations must work closely together. However, many have a dependence on manual processes, separate silo teams and systems which impacts the security team’s efficiency and effectiveness. Typically enterprises have diverse operation centers or teams e.g. NOC, SOC or IT operations requiring firstly a set of shared…

Do ‘Know Your Customer’ programs really work?

“Know me? No? It’s me!” Every time I walk into an establishment where I hold some sort of loyalty card, I wonder if “they” really “know me.” That got me to thinking about Know Your Customer (KYC) programs. More and more, financial institutions are performing KYC, not to really get to know you, but to check off that they followed yet another mechanical process. Recently, I ran into a very good friend of mine that I had lost touch with for almost 30 years. When we met…

The CEO-Fraud: Billions Lost – Organizations Should Really be Afraid

Social engineering is one of the most popular and old scam techniques that actually works. As we have already moved on to the cyber age, where our financial records, research & development data, social life or medical history exist online, it is really crucial that this kind of information does not fall prey to the fraudsters. However, it does. Fraudsters have now turned their heads towards the corporate and business world. The statistics about social engineering hacks on businesses or the scam where a trading…

Keeping up in an Ever Extending Vendor Universe

Author: Tolga Yilmaz As companies evolve and their exponentially expanding requirements need to be satisfied, third parties and vendors come more and more into play. The reasons for this are justified, more than ever… as more companies become reliant on Information Technologies and Professional Services, they need to procure the best products, which requires in some instances deep knowledge of certain subjects. In some instances, some organizations have begun to outsource complete units as they primarily do not align with their subject matter expertise, and…

Is your Application Development Secure?

As companies more and more rely on more specific business applications in today’s fast paced business environment, the software development facilities serving the company have become a strategic partner. A partner that has become overwhelmingly occupied with projects so detailed and complex that it was just necessary to split up the project phases that developers can concentrate on their core duties… the code itself. So far so good, you have it all; your Project Management Office to coordinate the efforts and assign resources, Business Analysts…

Copyright 2016 21st CENTURY IT · RSS Feed · Anmelden