When you’re driving your car, you view it as something completely protected. You’re driving it, and if you’ve maintained it, it’s going to likely drive as it should. I recently spoke with a friend who said he views his car as a ‘black box’; he drives it, but he relies on his mechanic to tell him if something is wrong with it. The unfortunate reality is that now, even while you’re driving, your car could potentially be taken over by a rogue hacker.
While it may sound like something out of a spy thriller or sci-fi novel, over the last few years, hackers have found numerous ways to hack into a vehicle, from taking over the on-board navigation system through an unsecured WiFi network designed to look like a public network, to hacking into a local mechanic’s diagnostic system then using that system to access the car’s on-board diagnostics. more “Could Your Car Be Hacked? It’s More Possible Than You Think.”
The General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason. It impacts companies not just in Europe but potentially anywhere in the world.
We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever been. Large multinational companies have offices throughout the globe. more “GDPR: A Lens into the Bigger Picture of Digital Transformation”
If you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts. It could very well be the biggest little secret you’ve never heard of with respect to data security. What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions are having a difficult time keeping pace. more “Why Dynamic Authorization Is a Big Deal in Data Security”
Buzz words always amaze me. I love them if I think I coined them I love them until I think they are old and tired, but no matter what they seem to have a life of their own. Business transformation and Digital business transformation are a very hot topic these days in the enterprise space, but what does Digital Business Transformation really mean:
- Mobile first and cloud-enabled
- Collaboration requirements include always on, with seamless access anywhere and anytime, 24/7
- Digitally connected supply chains for highly responsive or just-in-time production
- Hyper-connected and complex business applications that are iPhone easy to use
- Internet of Things and Big Data driving real-time data decision streams and massive data volumes
more “What is Digital Business Transformation…really?”
We know the problem. Enterprise level Digital Rights Management usually means that I can encrypt something, (usually MSFT Office or PDF), but then when I try to share it with someone who should be able to access it I waste a boatload of time trying to get them access and eventually I just send the data in clear text and tell them not to share it. Uh-oh
EDRM can be a pain or even worse puts me in a position of being out of compliance with internal security policies or even worse . . . governmental regulations. Now to be clear, I have never done anything like this. I am simply giving it as an example of what I have heard from others . . . right? In today’s hyperconnected world I need to be able to share/collaborate securely with people in the extended enterprise, partners, etc. anytime, anywhere and on any device, 24/7. . . is that too much to ask? Oh and by the way, my life is more than just Microsoft Office and PDF documents, I need to share lot’s of different file types . . . you know the drill.
Oh last but not least, I need the EDRM to be automatic, seamless, and deeply integrated with SAP, since that is where most of this work happens for me.
EDRM for SAP
“Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of their information.
However, one leading global insurance company reports that another business mandate— offering best-in-class customer service—can pose challenges to the mandate to protect customer data. How does an organization provide anytime, anywhere access to services, while also protecting confidential customer data from unauthorized access and leak? more “Providing secure access to information for improved customer service while streamlining IT operations”