Schedule Demo

Search

Search page

Uncovering the Biggest Security Threats by Analyzing User Behavior

By Jasmine Chennikara-Varghese The biggest security threats are already inside your cyber landscape. Inside users silently navigate through your applications and databases, possibly exposing data through accidental misuse, compromised credentials or malicious intent. However, security teams prioritize monitoring and searching for attacks and intrusions coming from outside. Insider threat is usually considered mitigated with protections…

When the Insider Threat Wants to Steal Your Trade Secrets

We’ve covered several recent stories in the news about employees creating fraudulent invoices, entering fictitious vendors or changing bank account details to enrich themselves. These stories all focused on an employee or contractor diverting funds to themselves. But there’s another tactic that the inside threat can take that has even more devastating consequences to the…

Cooking the Books Instead of Pastries

It’s like you become a little kid again when you walk into a café and take a look at the wide assortment of pastries and cakes behind the display cases. Eyes widen… stomachs growl… thoughts of calories go out the window. The last thing going through your mind is the accounting practices at the café…

Time to Wake Up About the Inside Threat

Time to Wake Up About the Inside Threat The inside threat continues to grow at companies with various reports showing the insider is responsible for anywhere between 60% and 80% of breaches. Below are five stories about inside attacks that made the news in 2018: SunTrust Bank dealt with the internal threat earlier this year…

From Scalped Super Bowl Tickets to Fake Invoices at Microsoft

One employee can do a lot of damage. Just look at the headlines the other day from Microsoft. A grand jury indicted Microsoft’s former director of Sports Marketing and Alliances, Jeff Tran, for allegedly trying to create fake invoices for up to $1.4 million and scalping the company’s Super Bowl tickets for $200,000. Tran helped…

Security and Compliance

by Jasmine Chennikara-Varghese Organizations are challenged to maintain compliance to regulatory standards and internal mandates while proactively keeping users and data secure. As the cyber landscape evolves and becomes more complex, it is imperative to have sufficient visibility into users and transactions that impact both compliance and security.  Log data plays a significant role in…

The Top P2P Segregation of Duties Violations

by Craig Abramson, Pathlock Technologies According to the Association of Certified Fraud Examiners’ Report to the Nations on Occupation Fraud and Abuse, “the most prominent organizational weakness that contributed to the frauds in our study was a lack of internal controls, which was cited in 29.3% of cases, followed by an override of existing internal…

Running Out of Improvement Ideas for Procure-to-Pay?

By Terence Leung For organizations with a high volume of procure-to-pay transactions in multiple geographic locations and a complex network of suppliers, some are running out of ideas for improving Days Payable Outstanding (DPO) and other efficiencies. They have seek external help and developed better reports. But they find themselves approaching the limit of creditor…

Leverage Machine Learning to improve your Order-to-Cash Process

By Terence Leung Many organizations are not able to induce their customers to pay on time. Their Days Sales Outstanding (DSO) is suffering and actually increasing, as revenue grows. A popular action is to give discounts to late paying customers or worse, to undergo tougher tacks. Working capital and margin therefore continue to suffer. For organizations…