Wipro, the India-based IT giant, is in the news for a major breach of its systems. An advanced phishing attack has enabled hackers, possibly government sponsored, to use Wipro’s network to ‘listen’ to information exchanges with customers and external vendors. Is there a way to thwart data leaks right at the beginning? What should be done?
The innocuous office printer is a seemingly simple corporate device of everyday use. Despite stringent ‘go-green’ and ‘paperless office’ initiatives printing will continue to be. But what comes out needn’t be authorized printed documents. They may also be vital intellectual property or other sensitive information. It’s time IT Managers look beyond mere maintenance issues.
Manufacturing companies create and manage their IP based on CAD drawings that are often shared outside the organization. The risk of losing this IP is significant. Is there a solution to secure your CAD files without any major additional expense? Watch this brief demo to know how.
It is high time that data security practitioners – CIOs, CISOs and, indeed, even business leaders take a long and hard look at their IT security practices. If it does not include data security to a large degree, they have just left their treasure chest wide open.
Germany seems to be in the news for wrong reasons. The country paid its first GDPR fine recently. Now a major data breach in the country has potential to create a political furor. It is time the political, the public and all classes in between take a serious look at data security.
Cyber security companies and the US Department of Homeland Security warn of an increasing number of hidden hacker attacks on vulnerable SAP and Oracle applications which provide unrestricted access to systems.
Over a month ago the data protection authority of Baden-Württemberg imposed the first fine for violation of GDPR. This clearly means that companies’ honeymoon period is over. It is time they pull up their socks and get to work in meeting the regulation’s requirements.
The recent report about an ex-employee’s access to e-PHI data of a leading Colorado-based medical center raises another important question in addition to robust access control: How to protect data that egress an organization’s enterprise landscape?
PII of around 500 million(!) guests at Marriott hotels has been compromised. The cause of this is due to unauthorized access within its network since 2014. Could this have been averted as early as 2010 when it switched to SAP ERP?
Through this brief post, Philipp Meier, Vice President (Research & Development) shares his thought on the values of industry-university connect after the recently inaugurated bachelors programme in Information and Cyber Security.