Results for

Sort by:
  • Blog
    December 13, 2021
    Every day, clients come to us with questions about ransomware and how to best prepare their organizations against potential attacks. This is perhaps one of the most vexing challenges in cybersecurity as ransomware attack methods, motivation and barriers to entry are constantly evolving. We’ve collated three key questions that concisely explain ransomware: How do these attackers target my…
  • Blog
    December 7, 2021
    It’s no surprise that the Internet of Things (IoT) is undergoing rapid growth, creating a scenario where the tools are in high demand, but as technology outpaces the IoT ecosystem’s expansion, a vast attack surface is being created. What those new to IoT may not realize is that many IoT devices are being hacked within five minutes of being connected to the internet. Why? Because they have very…
  • Blog
    November 29, 2021
    It’s a challenging landscape out there in the world of compliance. Regulatory changes, data privacy concerns and evolving trends like the hybrid workplace are requiring companies to increase their focus on compliance, in all forms. Huge fines and potential brand damage from data breaches or the discovery of non-compliance by regulators can be crippling. Yet we see organizations continuing to…
  • Blog
    November 3, 2021
    Operational technology (OT) serves as the backbone and infrastructure the world relies on to provide critical resources and requires sustainable operations. to provide reliable technology services. The headwinds facing OT services include: many businesses are operating their OT networks with aging legacy technology, many business networks do not provide adequate segmentation between IT and OT,…
  • Blog
    October 26, 2021
    Traditionally, it has been a conundrum for many CISOs and CIOs working with SAP products on what is truly needed to ensure the security of their data for sensitivity or competitive advantage purposes. Standard Security Information and Event Management (SIEM) monitoring often fails to ensure the security of the SAP system because the specific SAP logs and analyses can’t be interpreted, and,…
  • Whitepaper
    October 6, 2021
    Cloud is on the rise in financial services and regulators are taking note. The widespread use of cloud service providers (CSPs) in the financial services industry continues to grow. According to a recent study by the Cloud Security Alliance (CSA), 91% of financial services organisations are actively using cloud services today or plan to employ them within six to nine months. That is double the…
  • Blog
    October 20, 2021
    Enough clients have asked questions about embedded analytics in SAP S/4HANA to warrant a blog post with considerations for analytic teams to use in preparation for an SAP S/4HANA implementation. This blog provides five considerations that have improved ROI for our clients. These considerations highlight new ways of working and the art of the possible in the organization’s future S/4HANA system…
  • Blog
    October 19, 2021
    The fourth industrial revolution, known as 4IR or Industry 4.0, is in full swing. It focuses heavily on automation, interconnectivity of devices, machine learning and real-time data. The intersection of 5G and edge computing technologies are core components of Industry 4.0 and are expected to reinvent industries, change the way security is implemented and revolutionize business operations.…
  • Flash Report
    August 7, 2020
    Identifying and Recovering Excessive Billings From Landlords Issue Is your landlord complying with the financial aspects of your lease? Commercial leases are often structured to include ambiguous and complex cost terminology aligning with the landlord’s financial interest. On top of a base rent payment, these leases often include subsequent expenses that vary year to year, such as common area…
  • Blog
    October 13, 2021
    In this two-part blog (see Part 1 here), we highlight how to improve the customer experience around SAP GRC using SAP Fiori. We also look at some of the benefits to consider when thinking about modernizing and maturing the processes and technology which support access governance of SAP applications. Fiori catalog design and security considerations The use of Fiori apps within the overall SAP…
Loading...