A case for fraud risk maturity assessment
What do you think is the number one mistake many fraud examiners, investigators and other governance champions make? The number one mistake is not something…
<%= domainName %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_title %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_description %>
What do you think is the number one mistake many fraud examiners, investigators and other governance champions make? The number one mistake is not something…
The threat actors have not only grown in numbers but have also become more sophisticated. They have mastered speed, precision, and agility in their endeavours…
Have you or your organization been a victim of a cyber incident or experienced a data breach? What kind of breach did you encounter? Did…
“Managing third-party vendor cyber risk is fast becoming the defining cybersecurity challenge of our time.” In the current corporate enterprise, any ICT supply chain is…
As organizations traverse the setbacks brought about by COVID-19 and the need to stop its vast spread, many have resorted to a routine of working…
“Dear Mr. Justin Williams, I’m Vikas Manjit Singh from Punjab (India). I belong to a city named Ludhiana. Mr. Williams, I am having a brother…
The massive shift to remote work caused by the COVID-19 pandemic left many businesses knowingly vulnerable to attacks from employees’ mobile devices. Mobile Devices are…
Do you ever realize that the deep web caters for close to 99% of the Internet? The dark web, a part of the deep web,…
As nations all over the world implement lockdowns and community quarantines, people and businesses rely on technology to continue with their lives. Deprived of their…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.