cabramson@greenlightcorp.com

/Greenlight Technologies
­
cabramson@greenlightcorp.com'

About Greenlight Technologies

This author has not yet filled in any details.
So far Greenlight Technologies has created 92 blog entries.

Are You More Concerned about the External Threat over the Internal One?

By |April 7th, 2017|Cyber Governance|

Are you more concerned about the external threat over the internal one? According to a recent survey of enterprise CISOs by LTM, 34% of respondents are very concerned about external threats while 25% are focused on internal ones. But does that concern match with what's actually happening in the enterprise? Here is a brief 80 [...]

Comments Off on Are You More Concerned about the External Threat over the Internal One?

Webinar: Know the Impact of User Security Risks and Get Audit Ready

By |March 31st, 2017|Access Violation Management|

Know the Impact of User Security Risks and Get Audit Ready Is your company challenged with managing known user risks? Are you and your CFO confident that you will be ready for your next audit? Many companies are embarking on transformation activities – creating Shared Service Centers, planning for S/4HANA, or simply looking to increase [...]

Comments Off on Webinar: Know the Impact of User Security Risks and Get Audit Ready

Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

By |March 15th, 2017|Access Violation Management|

Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success Is your company planning to move to SAP S/4HANA? Managing known user risks both before the move and ensuring you are compliant after the move are critical to the success of the project. During this time of transformation, it’s important [...]

Comments Off on Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

Top 5 Cybersecurity Breaches in February

By |March 7th, 2017|Cyber Governance|

Top 5 Cybersecurity Breaches in February Whether it’s due to malware being found on payment devices or spoofed emails that lead to a data breach, companies are losing the battle to protect their crown jewel assets. It’s easy money to these hackers once they gain access to this information so they’ll continue to find new [...]

Comments Off on Top 5 Cybersecurity Breaches in February

On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

By |March 3rd, 2017|Access Violation Management|

On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to S/4HANA? View this special on-demand webinar to learn firsthand how Jabil Circuit achieves compliance despite their ever-changing environment. Hear [...]

Comments Off on On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

Why the CFO Is Just as Responsible for Cybersecurity as the CISO

By |February 28th, 2017|Cyber Governance|

Why the CFO Is Just as Responsible for Cybersecurity as the CISO A recent survey conducted by LTM Research targeting 2000 enterprise CISOs found that 59% of the respondents indicated that it is difficult to receive funding for security initiatives. And 70% of them are concerned about undetected breaches. So the CISO is charged with [...]

Comments Off on Why the CFO Is Just as Responsible for Cybersecurity as the CISO

Heading to GRC2017? Don’t miss these sessions!

By |February 20th, 2017|Access Violation Management|

Heading to GRC2017? Don't miss these sessions! Our close collaboration with SAPinsider this year has made it possible to extend a special registration discount off the on-site registration price: Register now and save $300 by clicking here. Don't forget to join us for these special sessions during the event: Panel discussion: Customers of SAP Access [...]

Comments Off on Heading to GRC2017? Don’t miss these sessions!

How Much Did the Verizon Breach Cost?

By |February 16th, 2017|Cyber Governance|

How Much Did the Verizon Breach Cost? As Verizon was in the process of closing the $4.83 billion deal to acquire Yahoo, news hit about the largest data breach ever. Rumors were swirling that Verizon may pull out of the deal but now comes word that they have agreed to a price cut of $250 [...]

Comments Off on How Much Did the Verizon Breach Cost?

Understand the Financial Exposure of Access Risks

By |February 14th, 2017|Access Violation Management|

Understand the Financial Exposure of Access Risks Managing the access that business users have to enterprise applications is a balancing act. Granting too much access leaves organizations exposed to higher risk, but granting too little prevents people from doing their jobs and slows business momentum. Organizations need insight into the financial impacts of access risk [...]

Comments Off on Understand the Financial Exposure of Access Risks

Top 5 Cybersecurity Breaches in January

By |February 9th, 2017|Cyber Governance|

Top 5 Cybersecurity Breaches in January Despite all of the security steps companies are taking, hackers are still finding their way in to an organization’s crown jewel assets. Here are the top 5 breaches reported in January. U.S. Cellular: This breach hasn’t been verified but it has been reported that a hacker is selling a [...]

Comments Off on Top 5 Cybersecurity Breaches in January