The Shadow Data Risks Hiding in Your Supply Chain In early June, news broke that data on 130,000 UBS employees had surfaced on the darknet – not because hackers broke through UBS’s own defences, but via a supplier: procurement service provider Chain IQ. UBS wasn’t...
Access Granted – But at What Cost? It’s 6:00 p.m. on Friday – the working week is officially over. A junior finance officer is just about to turn off the lights and leave for the weekend when an urgent call comes in from IT. For some reason, the payroll run...
We’ve all heard the hype. Artificial intelligence is transforming everything – from customer service and logistics to hiring and fraud detection. As early as 2017, The Economist argued that data, rather than oil, had become the world’s most valuable resource. But...
‘Training is the crucial link between strategy and action and ensures that everyone involved – be it management, end users, IT teams or audit – plays their part in security and compliance in application systems.’ Priska Altorfer, CEO wikima4 AG Recently,...
In today’s interconnected world, ERP systems power critical business functions – but what happens when a security gap brings everything to a standstill? The consequences can be devastating, ranging from data breaches to operational chaos. ERP environments are the...
mesaforte.firefighter Agile access management: fast and audit-compliant Agile access management is a cornerstone of operational success. Static access policies cannot fend off the increasingsophistication of cyber threats. But in every company, temporary...