Securing SAP S/4HANA with GRC 12 and IAG

With enterprises focusing on big data, mobility and cloud while managing cybersecurity risks that could exploit internal vulnerabilities that allow access to sensitive data, organizations have been on high...

Enhancing Security Strategy for Cloud-Based Technology

As part of our Cybersecurity Webinar Series last month, we presented a webinar on enhancing security strategy for cloud-based technology. Here is a summary of the topic discussed. For the full discussion...

Managing Data Governance in a Cloud-Focused World

The rate at which companies are amassing data is staggering. More than half of organizations today (57%) have production workloads running in the cloud, and with the number of new devices being introduced that create and consume data and transmit it...

Top Signals for Cloud Adoption

How Has the Cloud Evolved? Cloud started as a peripheral technology option, offering companies and individuals convenience and flexibility at the cost of control and security. As time has passed, however, cloud technologies have matured and become...

How Well Are We Adjusting to GDPR?

Enough time has passed since the General Data Protection Regulation (GDPR) came into effect, allowing GDPR-relevant people whose personal data is being collected, held or processed time to exercise their rights and clear their inboxes of privacy...

GDPR: Here’s What’s Happened So Far

After four years of preparations and numerous revisions, the General Data Protection Regulation (GDPR), the most-lobbied piece of legislation in the history of the European Union, was finally approved by the EU Parliament in April 2016. Following a...