Blog
Our experts have a say…
Leavers’ threat – a simple and powerful IT security threat for any company
Employees leaving by the door can come back through the window A sysadmin in New York has just been sentenced to two years in prison for hacking his old company. This sysadmin had been let go by his company in 2010, taking with him all of his credentials. Or maybe he...
Operations’ autonomy and cloudification: what about risk management?
Decentralization and cloudification Why do IBM mainframes always make us think about prehistory and dinosaurs? Or is it only about different sociological or "ideological" perspectives? Today's employee: services consumer and focused on business goals...
Active Directory: why is it so sensitive and how to secure it
New Brainwave GRC video on our Youtube channel! Security and sensitivity of Active Directory for organizations
Automate data extraction and secure up-to-date security audit
Automate processes from data extraction to security risks analysis and accounts/permissions review Lots of data extractors are already available on the Brainwave GRC Marketplace, allowing you to automate your data extractions and save significant time and efforts! By...
Filling the gap between hackers’ entrance and detection in your IT system
Setting up powerful firewalls and data breaches detection solution is not enough Many vendors offer protective solutions to ensure that no external threat, no hacker will be able to enter your IT system. Unfortunately, we know that it takes only up to 6 days for a...