article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

“Enterprises need to accelerate digital transformation while giving their workforce the flexibility to work on any device from anywhere in the world. In doing so, it is vital to protect the company’s systems, intellectual property and sensitive data—all without interrupting business performance.

article thumbnail

Improve your data relationships with third parties

Collibra

Regulators are focusing on the data relationships financial services organizations have with third parties, including how well personal information is being managed. There are several areas that the international financial services regulatory community is engaged in that touch on third party personal data relationships.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Related: Identity governance issues in the age of digital transformation. I had the chance at RSA 2019 to visit with Mike Kiser, global strategist at SailPoint , an Austin, TX-based supplier of IGA services to discuss this. SailPoint, which went public in November 2017, has grown to more than 1000 employees in 30 locations.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. Related: The ‘Golden Age’ of cyber espionage is upon us.

Security 140
article thumbnail

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

The Last Watchdog

Related: How 5G will escalate DDoS attacks Caught in the pull of digital transformation , companies are routing ever more core operations and services through the Internet, or, more precisely, through IP addresses, of one kind or another. For a full drill down on our conversation, give a listen to the accompanying podcast.

Cloud 171
article thumbnail

Six big takeaways for financial institutions from CBA LIVE

CGI

Six big takeaways for financial institutions from CBA LIVE. As a consulting executive, I help clients in the banking industry on everything from their vision for digital transformation, to the nitty-gritty of implementation and execution. With great rewards come great risk—the threats of digital transformation.