Blog
Our experts have a say…
Identity Analytics is at the Heart of a Cybersecurity Strategy
We live in a world where all users, whether employees, providers, sub-contractors, partners or customers, have become intense consumers of data and IT services. Additionally, with the new work- from-home phenomenon, it has become impossible to control the work space...
How to protect your passwords from hackers?
The current health crisis is greatly accelerating telecommuting for employees with a job that allows it. We have seen in the news that there has been an increase in computer attacks which take advantage of loopholes related to telecommuting, especially...
Brainwave GRC joins CyberArk C3 Alliance Program
Brainwave GRC is pleased to announce that CyberArk has certified its Booster for PAM solution as part of CyberArk’s C3 Alliance Partner Program. Brainwave GRC will work with you on your PAM programs involving the CyberArk solution. WHY IS BRAINWAVE GRC JOINING...
Why you should review Privileged Accounts even if you are already using PAM solutions
THE PROTECTION OF PRIVILEGED ACCOUNTS IS A SENSITIVE ISSUE IN TODAY’S BUSINESS WORLD. These accounts are extremely critical because they allow you to manage and modify access to company assets and to take partial or total control of critical applications or...
ITGC IT General Controls
ITGC How did it begin? In October 2001 when the Enron scandal broke, the company specialized in energy brokerage, at the time one of the largest market capitalizations in the world. The focus of the scandal was a recurring falsification of accounts, with the...
Cyber Resilience, the new Cybersecurity?
Cyber resilience, the new buzz term? Recently, you have most likely heard or read articles about "cyber resilience". This term that comes up regularly in the media is presented as the future of cybersecurity. According to Accenture, cyber resilience is "the...
What Identity Analytics really is and why you need it
IT security's advent: the "identity" concept as key factor Digital transformation has changed and is changing more and more business processes, job positions as well as many companies' core activities. In consequence, it has implied a change in the way we...
Is IAM outdated? Why you need to study alternatives
15 years of IAM: the end of an era? IAM projects have blossomed since the early 2000's and most large companies implemented one. Unfortunately, for most organizations, a significative gap appeared between what they hoped to get from their IAM...
5 reasons why access-related security is key to hybrid ERP transformation
Hybrid ERP: the postmodern transformation for ERPs Postmodern ERPs are the new form of ERP systems, no longer coming only from single-instance megasuites such as SAP or Oracle. ERPs are now hybrid - mega-suite on-premise but also partly in the cloud - or even fully...
Controls automation: auditors and internal control’s key to success?
Why and how should a company automate controls? The reasons to automate controls processes will logically depend on the company's context and security challenges. Fighting against fraud is one of the main reasons for organizations to implement controls automation...