Search
SoD Conflicts: 7 Ways to Prevent a Conflict Before it’s Too Late
What are SoD Conflicts? Organizations separate duties in order to prevent the abuse of critical combinations of operations. To avoid criminal activities by one insider, and comply with relevant regulations, management should implement preventive measures, which include separation of duties (SoD). To prevent abuse of access rights, organizations first need to identify SoD conflicts. This…
Separation of Duties Security: Ensuring Security Supports SoD
What is Separation of Duties Security? Separation of duties (SoD) is a principle that restricts users from getting more privileges than needed, with the aim of preventing abuse of privileges. For example, employees preparing paychecks should not also have permission to authorize them, because that would create a short circuit where they could overpay themselves…
Streamlining SOX Compliance and 404 Audits with Continuous Controls Monitoring (CCM)
For many publicly traded companies, complying with the Sarbanes-Oxley Act has become a growing source of frustration. Though the complexity of their landscape has grown, the maturity of control testing frameworks has not kept pace. To avoid ballooning control testing costs and risk of a failed audit, companies must adapt to an automated controls landscape…
[Customer Story] Collin County, Texas, Uses Pathlock’s MFA Solution To Improve PeopleSoft Security
Collin County, like all counties in Texas, is considered an extension of state government. Located just north of Dallas, Collin County (the County) provides various government services to its more than 1,000,000 residents. The County’s security team is responsible for enabling secure yet convenient access to appropriate information and services for their on-premise installation of PeopleSoft….
Layer 7: Securing The Enterprise at the Application Level
Business applications continue to be a top target for attack, with more organizations than ever reporting breaches that began within the confines of a business application. For example, did you know that the Colonial Pipeline ransomware attack ultimately brought down their billing system, which was what caused their days long outage? Protecting the cyber landscape…
How SAP Customers Use Data Masking To Manage Global Business Risks
Here are two use cases that might sound familiar… While organizations spend millions combatting external threats, for example, hacking, phishing, and ransomware, we at Pathlock have found most data security use cases are focused on data governance across the enterprise. Simply put, what can someone access depending on where they’re located, what business unit they…
Zero Trust Is A Centerpiece Of President Biden’s Latest Executive Order On Cybersecurity
On May 12th, President Biden signed an Executive Order to help improve the nation’s cybersecurity posture and strengthen Federal networks. This order was preceded by several high-profile attacks like SolarWinds and most recently, the Colonial Pipeline – both of which highlighted key deficiencies in the federal government’s ability to detect, respond, and ultimately communicate about…
Uniting Appsian & Xpandion (GRC): Thoughts From Xpandion CEO, Moshe Panzer
Taken from Moshe Panzer’s May 4th blog post on xpandion.com: For 14 years, Xpandion has been on a mission: to help organizations create better alignment between user permissions, authorizations, and security best practices. Xpandion’s innovation originated from our deep roots in SAP and developed alongside the market’s enterprise business processes that steadily increased in complexity….