
IT service management: security’s best friend
Your IT service management (ITSM) teams can serve up good security practices with your help.

GDPR is live! – Now what?
GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

Nation state attacks – the cyber cold war gets down to business
Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

Getting to know your company’s risk appetite
Your employees make risk/reward decisions daily. Have you defined risk boundaries for them? Unwanted risk or missed opportunities happen without clear direction.

Take a cue from Europe on making GDPR work
GDPR compliance is not a customer-service proposition. To better understand GDPR, U.S. companies should adopt a European mindset.

Time to close the gate on open wireless networks
Trusted networks are not always what they seem. Ask a hacker. They love your employees’ casual use of open wireless networks.

The risk of okra
It is important for your company to identify risks you should be taking as part of being in your business...like a supermarket does when stocking okra.

Do you patch your systems? How do you know?
Can you answer this question: how do you know the laptop that shows up today in Tokyo is the same one that was in New York last week? Make sure you have a complete inventory of hardware and software so you can be confident your...