Access and Feeds

Blog Archives

ERP Security: Two-Thirds of ERP Systems Leaky or Breached

By Dick Weisinger

Two-thirds of ERP apps have been breached within the last two years, according to a study by IDC/Onapsis. Frank Dickson, Vice President at IDC, said that “ERP applications can be foundational for businesses. A breach of such critical ERP applications

Security: Shifting Left to Bake in Effective Security

By Dick Weisinger

“Shift Left security” is the idea that security should be considered and integrated into software during the development cycle, rather than as an afterthought much later. The rationale is that security issues are avoided much earlier during development when it

Smart City Ecosystems: An Invitation to Hackers?

By Dick Weisinger

By 2050 two-thirds of people will be living in urban areas. Smart application of technology to cities is expected to improve the quality of life for its citizens. Some of the goals of Smart Cities include utilizing resources efficiently, reducing

Cloud Security: Problems Arise from Lack of Planning and Training

By Dick Weisinger

Businesses will spend more than $100 billion globally this year on security, according to analyst firm IDC. Increasingly, more of those budgets are directed towards cloud security. Cloud security in 2018 accounted for 18 percent of the total, but it

Homomorphic Encryption: Secure Processing of Data

By Dick Weisinger

Homomorphic Encryption is the processing of data while it remains encrypted. If it can be used, it would make the processing of data, particularly data on servers in the cloud significantly more secure. The problem is though that while the