cybersecurity

Five iPad Safety Tips

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks, says  security expert Brian Reed, vice president of products at mobile security vendor BoxTone. SSL encryption on the  iPad is a fast and convenient way to protect data in motion. […]

Five iPad Safety Tips Read More »

Watch Your Avatars

Enterprise software helps set rules for virtual worlds Consumer-friendly technologies like Web-based e-mail and instant messaging, Twitter and Facebook have all brought compliance challenges, with companies typically reacting after something has gone wrong. With virtual environments and meetings, however, companies can get ahead of the trend, setting guidelines and preferred platforms before employees start adopting

Watch Your Avatars Read More »

The Great Risk Race

As Asia’s dynamic markets demand risk management attention and expertise, financial firms rush to fill a talent gap, with particular urgency in China. Three years ago, when Yang Haitao, an experienced financial risk manager, moved to Shanghai to join Nanyang Commercial Bank (China), he knew it was going to be more than a routine job

The Great Risk Race Read More »

Six Steps to Better IT GRC

Securing corporate IT systems is crucial, but there are ways to make that effort more productive and less costly. Companies have spent years beefing up their information technology governance, risk and compliance systems.   With cutting costs now top of mind in corporate America, here are six ways to make IT GRC systems more productive

Six Steps to Better IT GRC Read More »

Taming Spreadsheets

New software products aim to help companies get the whip hand over ubiquitous but risky spreadsheets. Concur Technologies helps companies automate the processes by which they manage employee travel and entertainment spending, but some of its own processes aren’t fully automated. “We’re like everyone,” says Terry DePolo, Concur’s director of accounting. “We’re trying to minimize

Taming Spreadsheets Read More »

Cloud Computing Rolls In

New services deliver a range of technology without up-front capital investment. The downside could be giving up control. More than a new buzz phrase to add to the list of client-server, ASP, hosted provider and software as a service (SaaS), cloud computing is a new stage in technology evolution. Clouds provide technology such as software,

Cloud Computing Rolls In Read More »

Enterprise Risk Management: Getting Holistic

The recent financial crisis has demonstrated that securities firms need to change the way they approach risk, needing now to consider a wider variety of economic scenarios and to evaluate risk in an enterprise-wide holistic way. To date, most securities firms have focused on segments of risk, said Richard Thornton, a manager with the London-based

Enterprise Risk Management: Getting Holistic Read More »

Is It Safe In The Clouds?

Earlier this month, a hacker reportedly exploited a vulnerability in an Internet-based virtualization software platform that took down more than 100,000 Web sites and other applications. “That was an intrusion that was cloud-specific–it went through a virtualized vulnerability,” said Jim Reavis, founder of the Cloud Security Alliance, an industry group representing risk managers at financial

Is It Safe In The Clouds? Read More »