IT service management: security’s best friend

IT service management: security’s best friend

Your IT service management (ITSM) teams can serve up good security practices with your help.

GDPR is live! – Now what?

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

Nation state attacks – the cyber cold war gets down to business

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

Getting to know your company’s risk appetite

Getting to know your company’s risk appetite

Your employees make risk/reward decisions daily. Have you defined risk boundaries for them? Unwanted risk or missed opportunities happen without clear direction.

Take a cue from Europe on making GDPR work

Take a cue from Europe on making GDPR work

GDPR compliance is not a customer-service proposition. To better understand GDPR, U.S. companies should adopt a European mindset.

Time to close the gate on open wireless networks

Time to close the gate on open wireless networks

Trusted networks are not always what they seem. Ask a hacker. They love your employees’ casual use of open wireless networks.

The risk of okra

The risk of okra

It is important for your company to identify risks you should be taking as part of being in your business...like a supermarket does when stocking okra.

Do you patch your systems? How do you know?

Do you patch your systems? How do you know?

Can you answer this question: how do you know the laptop that shows up today in Tokyo is the same one that was in New York last week? Make sure you have a complete inventory of hardware and software so you can be confident your...

Top Blog Posts