Expert Insights

blog

Cyber Security


Single Sign-On in the Wild

A rash of rogue food orders with the company Deliveroo allowed hungry hackers to go on a booze and food binge in 2016—they logged in to customers’ accounts, changed delivery addresses, and ordered whatever they pleased.

Karsten Huttelmaier by Karsten Huttelmaier

Leveraging Facial Recognition in your systems

Security is an important aspect of our lives and we use various means of security every day. In order for us to secure items in our lives, we have to have a trust factor. This applies to our bank accounts, our passwords, and even vehicles that we utilize every day. Sometimes, security can be complex -- in the case of bank account being accessed over the internet, or a rolling security codes in your car's remote start module, or RFID and barcodes in your driver license or passport.
 

Lwin Maung by Lwin Maung

Tech Talks - Azure Security Center

In this episode of #techtalks, Nathan illustrates the possibilities of Azure Security Center and how it can give you tighter control over what's most important to your business. 

Jake Borzym by Jake Borzym

EUROPEAN CYBERSECURITY: How will it affect you?

The European General Data Protection Regulation (GDPR) is a hot topic
in information technology, and it’s highly relevant for CPAs and other
financial professionals. This article outlines three reasons why a European
regulation matters here in the U.S.—and how GDPR fits in with other
cybersecurity frameworks, including National Institute of Standards and Technology
(NIST) and the new American Institute of CPAs (AICPA) reporting standards.

Jake Borzym by Jake Borzym

GDPR’s Personal Data Definition & Privacy Notice Guidelines

One of the defining transparency requirements under the General Data Protection Regulation is for organizations to allow individuals the right to be informed about the collection and use of their personal data. When personal data is collected, organizations must immediately provide individuals with a privacy notice including: how the data will be used, how long it will be held, and who it will be shared with.
 

Concurrency Blog by Concurrency Blog