Blog

10 Cream-of-the-Crop IAM (Identity and Access Management) Software Solutions in 2021

Are you looking for an Identity and Access Management (IAM) solution? You’re spoiled for choices. With the IAM market expected to hit +$24 billion by 2025, vendors are eager to create Identity and Access Management solutions to meet modern security needs. In fact, there are well over a hundred Identity and Access Management solutions with […]

Read more
The 19 Best SOX Compliance Software Solutions

The Sarbanes-Oxley Act of 2002 (SOX) was designed to protect investors from fraudulent accounting practices at public corporations. While a win for investors, the act created an increased regulatory burden on businesses, requiring strict protections to guard against fraud. Because the cost of non-compliance with SOX can be high (e.g., reputational damage, stock drop, remediation […]

Read more
Top 15 Insider Threat Management Solutions for Enterprises

When we think of threat management, we often assume that the most dangerous security threats come from external sources. All too often, we not only underestimate the likelihood of insider threats, but also the potential damage they can cause.  Insider threat involves malicious activity within an organization that’s typically carried out by a current or […]

Read more
5 Years for Creating Vendors and Paying Them

Do you know what applications your employees have access to and what they’re actually doing with that access? NJ Transit is yet another organization that found out the hard way what can happen if you don’t. An NJ Transit supervisor just pleaded guilty to stealing $2.1M by creating vendors and then paying them. These vendors […]

Read more
Material Weaknesses in the Second Quarter

As part of FERF’s and Greenlight Technologies’ ongoing research into ICFR, we have created a program to automatically review all quarterly public filings and highlight those companies that have reported a material weakness. We are aggregating that information into meaningful data to show trends for you to review. Material weaknesses continued a cyclical pattern of […]

Read more
What’s in your wallet? Hopefully $80 million…

It was just about a year ago that we wrote about the Capital One breach. The personal information for approximately 100 million customers was compromised. The company is still dealing with the aftermath as the Office of the Comptroller of the Currency just announced an $80 million fine. They blamed the company for failing to […]

Read more
Use Continuous Monitoring Solutions to Quantify Actual Risk Exposure

Guest Blog by:Vijan Patel, Director, Technology Consulting, Enterprise Application Services, ProtivitiJohn Scaramucci, Associate Director, Technology Consulting, Enterprise Application Services, Protiviti Click here to read the full blog on Protiviti’s web site In today’s growing remote workforce, companies are faced with the challenge of scaling centralized authentication and user provisioning, while at the same time managing […]

Read more
Give $1000. Get $2000. Did the Insider Threat Strike Again?

Did you fall for it? After all, it looked very credible. Seeing a tweet from Elon Musk’s verified account on July 15th claim, “Everyone is asking me to give back, and now is the time. You send $1,000, I send you back $2,000.” This came soon after reports came out about Musk climbing up the […]

Read more
The Pandemic, Privileged Users and the Growing Inside Threat

We know the impact that the pandemic has on businesses will be felt for years to come and we’re still not out of it as numbers climb around the world. Parts are reopening while others are closing again. The key is to figure out ways to mitigate that disruption because it has had a ripple […]

Read more
The €1.9 Billion Vanishing Act

How can you make €1.9 billion disappear from the balance sheet? German payments provider Wirecard found out the hard way that you can’t. The company just filed for insolvency and its CEO was arrested after auditors accused it of committing an “elaborate and sophisticated fraud.” Auditing firm EY stated, “There are clear indications that this […]

Read more