Conducting Forensic Accounting
A basic use of forensic accounting skills can enable an organization to take the proper first steps in the event of a suspected fraud. You…
A basic use of forensic accounting skills can enable an organization to take the proper first steps in the event of a suspected fraud. You…
Cyber crime has become a fact of life for businesses of all sizes. As the battle with external forces has intensified, companies have spent a…
Privileged accounts exist in many forms across an enterprise environment, and they pose significant security risks if not protected, managed and monitored. The types of…
There’s a lot of conversation taking place around the merits of penetration testing vs. bug bounties, pentesting vs. vulnerability assessments, bug bounties or a red…
Asset misappropriation fraud occurs when people who are entrusted to manage the assets of an organization steal from it. Employees in an organization may choose…
Document all investigations Prepare written reports of investigation results Prepare evidence for presentation in court Testify in court about investigation findings Interview suspects and witnesses…
Procurement fraud can wipe out much of a company’s profits and damage a nation’s ability to invest. The quality of procurement can make the difference…
Your corporate success relies on the people you bring on board. It is important to take steps to hire the best employees. Contacting former supervisors…
Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under…
In light of the current cyber-attacks which have affected more than 200,000 people in over 150 countries people have been advised that the most common…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.