Added by Enrique Raul Suarez on January 19, 2016 at 12:17am — No Comments
Added by Enrique Raul Suarez on January 19, 2016 at 12:07am — No Comments
Added by Enrique Raul Suarez on January 18, 2016 at 11:56pm — No Comments
A Must-See Video Documentary
Added by Enrique Raul Suarez on January 18, 2016 at 11:39pm — No Comments
The role of today’s risk managers is clear: to close the gap between strategic-level initiatives and the operational risks faced at the activity level.
To do this, many organizations are adopting risk-based GRC programs – both at the request of senior management and to meet the expectations of regulators. A large number of these programs rely on spreadsheets and shared drives to manage information collected across departments and levels. But today’s GRC software solutions are proven…Continue
Added by Steven Minsky on January 15, 2016 at 5:30pm — No Comments
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves know this. They’re counting on you to slip up.
Added by Robert Siciliano on January 15, 2016 at 3:32pm — No Comments
Leadership is an important and relevant skill to develop for anyone--across all industries, across all corporate functions, both in and out of the office. Michele Sancricca is uniquely qualified on this topic, having spent several decades as a leader in both the military and corporate worlds.
I am privileged to have Michele as a personal friend. Recently, I took the opportunity to pick his brain on the topic of Leadership. Leadership topics discussed include leadership tools,…Continue
No company is immune from hackers—even a toy company. Hong Kong based VTech got hit by a hacker recently. This company makes techy educational toys for kids, and its database got breached.
Customers go to the Learning Lodge store and download content to their children’s VTech devices. The devices for downloading to are a tablet, watch and action camera.
But recently, this gateway store was attacked.
Some customers’ private information—now in the hands…Continue
Added by Robert Siciliano on January 14, 2016 at 3:01pm — No Comments
If you’re going to drone on and on about how you got hacked by a cyber thief, maybe it’s because you played with your new drone—you know, those rad little flying devices that hover via remote control over your street? Yes, they are hackable.
If you don’t have a drone, don’t be surprised if you get one as a gift this season, as Americans are spending tens and tens of millions of dollars on them.
First off, if you spot a drone, before you go, “Wow, cool, there’s…Continue
Added by Robert Siciliano on January 12, 2016 at 3:20pm — No Comments
Greta Roberts, CEO Talent Analytics, Corp.
When beginning a new predictive analytics project, the client often mentions the importance of a “quick win”. It makes sense to think about delivering fast results, in a limited area, that excites important stakeholders and gains support and funding for more predictive projects. A…Continue
Added by Greta Roberts on January 8, 2016 at 7:35pm — No Comments
A group of people who are actively collaborating to commit identity fraud is known as an identity fraud ring. These rings are generally made up of two or more career criminals, often including family members or close friends. These rings work by members either stealing a victim’s identity or sharing personal information such as a date-of-birth or Social Security number. Though many fraud rings occur in large cities, there are a surprisingly high number of rings found in rural…Continue
Added by Robert Siciliano on January 7, 2016 at 3:03pm — No Comments
Chinese Politburo is trying to manage markets and flow of money.
And, they are failing miserably.
The CDS events, Credit Default Swaps created a big crack in the US Capitalistic System.. in 2008/2009.
Money or Wealth is very slippery and difficult to manage or control.
India's new prime minister Modi was…Continue
Added by S Paul Mohan on January 7, 2016 at 12:56pm — No Comments
The only certainty is uncertainty. The Uncertainty Paradox!
I finished last year writing about our tendency towards impulsiveness and our counter-tendency towards indecisiveness. Both are very real and are played out under different circumstances EXCEPT the underlying issue is ‘uncertainty’.
Impulsiveness is a problem because we fail to consider the uncertainties well enough while indecisiveness raises its ugly head because we can see all the uncertainties. The solution? A…Continue
Added by Bryan Whitefield on January 6, 2016 at 11:21pm — No Comments
Added by Enrique Raul Suarez on January 5, 2016 at 7:30pm — No Comments
Added by Enrique Raul Suarez on January 5, 2016 at 7:23pm — No Comments
Added by Enrique Raul Suarez on January 5, 2016 at 7:13pm — No Comments
Increasing cyber-hazards have been accompanied by another trend; Governance, Risk Management, and Compliance (GRC) focused on IT (referred to as IT GRC) is changing. More and more organizations have been turning to a risk-based approach.
Traditionally, IT is comprised of a variety of underlying functions. These functions include:
Added by Steven Minsky on January 4, 2016 at 3:30pm — No Comments