IT service management: security’s best friend

IT service management: security’s best friend

Your IT service management (ITSM) teams can serve up good security practices with your help.

07/11/18

GDPR is live! – Now what?

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

06/08/18

Nation state attacks – the cyber cold war gets down to business

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

04/19/18

Getting to know your company’s risk appetite

Getting to know your company’s risk appetite

Your employees make risk/reward decisions daily. Have you defined risk boundaries for them? Unwanted risk or missed opportunities happen without clear direction.

03/16/18

Take a cue from Europe on making GDPR work

Take a cue from Europe on making GDPR work

GDPR compliance is not a customer-service proposition. To better understand GDPR, U.S. companies should adopt a European mindset.

02/23/18

Time to close the gate on open wireless networks

Time to close the gate on open wireless networks

Trusted networks are not always what they seem. Ask a hacker. They love your employees’ casual use of open wireless networks.

12/14/17

The risk of okra

The risk of okra

It is important for your company to identify risks you should be taking as part of being in your business...like a supermarket does when stocking okra.

11/07/17

Do you patch your systems? How do you know?

Do you patch your systems? How do you know?

Can you answer this question: how do you know the laptop that shows up today in Tokyo is the same one that was in New York last week? Make sure you have a complete inventory of hardware and software so you can be confident your...

10/09/17

Load More