Read the Latest from Greenlight

Material Weaknesses in the Second Quarter

As part of FERF’s and Greenlight Technologies’ ongoing research into ICFR, we have created a program to automatically review all quarterly public filings and highlight those companies that have reported a material weakness. We are aggregating that information into...

What’s in your wallet? Hopefully $80 million…

What’s in your wallet? Hopefully $80 million…

It was just about a year ago that we wrote about the Capital One breach. The personal information for approximately 100 million customers was compromised. The company is still dealing with the aftermath as the Office of the Comptroller of the Currency just announced...

Managing Insider Threats

Managing Insider Threats

by Jasmine Chennikara-Varghese, Greenlight Technologies Employees are perhaps one of the most challenging security risks to the modern business landscape. Insider threat comes from those authenticated and authorized users performing potentially damaging activities...

GDPR – Year 1

GDPR – Year 1

The European Union’s (EU) General Data Protection Regulation (GDPR) has been in effect for over a year now. GDPR’s key objective was to empower people with more control over their personal data.  GDPR requirements have impacted compliance and forced an evolution...

Shall we play a game?

Shall we play a game?

It’s that famous line delivered by Joshua (a.k.a. WOPR, or War Operation Plan Response) to Matthew Broderick in the movie WarGames from 1983. It’s been a long time since that movie first came out, so here’s a quick refresher – Broderick thinks he’s hacking into a...

Superman III and the Inside Threat

Superman III and the Inside Threat

Yes, you read that right… a reference to a really bad 80s movie (1983 to be exact) and the inside threat. You must be wondering how the two are related. Before I explain, I want to make it clear that this is not a recommendation to watch this movie. In fact, it only...

Insider Threat in the Cloud

Insider Threat in the Cloud

By Jasmine Chennikara-Varghese As applications and the sensitive data they contain migrate to the cloud, the risks linked to insider threat persist. Cloud services empower end users to be more mobile, flexible and productive while also simplifying IT management and...