Search
The Accountant Shortage: A Hidden Threat to Accurate Financial Reporting
The global shortage of skilled accountants has been making headlines, but its ripple effects extend far beyond unfilled positions. A lack of qualified accounting professionals is quietly eroding the strength of financial reporting controls within many organizations. This weakness has resulted in a concerning trend: an increase in delayed or restated financial reports. Nearly 640…
SEC’s Cybersecurity Mandate: A New Era of Executive Liability and the Power of CCM
The Securities and Exchange Commission (SEC) has sent shockwaves through the corporate world over the last year with its groundbreaking cybersecurity rules. These rules place executives and board members directly in the crosshairs when it comes to their organization’s cybersecurity posture and incident response. The message is clear: cybersecurity is no longer just an IT…
CCM: The Linchpin of Effective Risk Quantification in Meeting SEC Guidelines
The Securities and Exchange Commission’s (SEC) new rules on cybersecurity incident disclosure have sent ripples across corporate boardrooms. The mandate is clear: companies must disclose any cybersecurity incident deemed “material” within four business days. But what constitutes a “material” incident? The SEC’s definition hinges on whether there is a “substantial likelihood” that a reasonable investor…
Navigating SAP Security Notes: September 2024 Patch Tuesday
SAP published 16 new and three updated Security Notes for September 2024 Patch Tuesday. Compared to August’s SAP Security Patch Day release, this month’s release contains fewer patches overall and with lower severity. One security note received the HotNews maximum severity rating (CVSS scores ranging from 9.0 to 10.0), which is an update to the…
Three Critical SAP Data Security Lessons from the HealthEquity Breach
The recent data breach at HealthEquity, a leading health savings account provider, serves as a stark reminder of the growing risks organizations face in safeguarding sensitive data. The incident, which resulted in the exposure of 4.5 million customers’ personally identifiable information (PII), highlights the urgent need for robust data security measures, especially within complex ERP…
Beyond IGA: The Pathlock Approach to Fine-Grained Access Risk Analysis
The key to protecting data is controlling who has access to it. However, given the modern multi-application environment that most organizations operate in, this seemingly simple task is getting increasingly complex. Traditional Identity Governance and Administration (IGA) solutions have long been the go-to for managing user access following the concept of Zero Trust for least…
Beyond IGA: How Pathlock AAG Enables a Risk-Based Approach to Compliant Provisioning
In today’s fast-paced digital world, managing user access isn’t just essential—it’s a constant challenge. Whether it’s onboarding new hires, tweaking permissions for existing employees, or swiftly revoking access for those leaving, every action must follow a strict, pre-approved process. This ensures the right people have access at the right time, while also meeting audit and…
Beyond IGA: How Pathlock Uncovers Permission-Level Risks to Build Compliant Roles
The range of specialized ERP applications available today are making business processes efficient and simpler. While the user benefits from all the features at their disposal, security and compliance teams struggle to manage access across multiple applications while ensuring that users only receive the access they need. Traditional Identity Governance and Administration (IGA) tools have…
Beyond IGA: How Pathlock AAG Enables a Risk-Based Approach to Access Certifications
In today’s dynamic business environments, maintaining secure and efficient access to applications and data is paramount. Access certifications play a critical role in ensuring that user permissions are regularly reviewed and updated to meet audit compliance standards. However, traditional certification processes often fall short in addressing key risk factors associated with user access. This is…