December 21, 2018

The Most Prominent Data Breaches of 2018 – Part I

As the year draws to an end, we like to take stock of all the positives and negatives on our personal and professional fronts. We reminisce the victories, mull over the difficult times and make

Read More
December 13, 2018

How to Prepare for (and Avoid) Software Audits

Complex and highly interpretive, software audits are like an evil spirit that can cast a gloomy shadow on any organization’s profitability and reputation. However, as CIOs and IT specialists, you

Read More
December 10, 2018

How to Budget for Cybersecurity in 2019

While information security threats continue to multiply and data breaches take on never-seen-before levels, cybercrime issues are worsening in both, scale and depth. With the backing of cartels

Read More
1
December 21, 2018

The Most Prominent Data Breaches of 2018 – Part I

As the year draws to an end, we like to take stock of all the positives and negatives on our personal and professional fronts. We reminisce the victories, mull over the difficult times and make

Read More
December 13, 2018

How to Prepare for (and Avoid) Software Audits

Complex and highly interpretive, software audits are like an evil spirit that can cast a gloomy shadow on any organization’s profitability and reputation. However, as CIOs and IT specialists, you

Read More
December 10, 2018

How to Budget for Cybersecurity in 2019

While information security threats continue to multiply and data breaches take on never-seen-before levels, cybercrime issues are worsening in both, scale and depth. With the backing of cartels

Read More
1

The Most Prominent Data Breaches of 2018 – Part I

Posted by GlassHouse Systems on Dec 21, 2018 10:34:45 AM

As the year draws to an end, we like to take stock of all the positives and negatives on our personal and professional fronts. We reminisce the victories, mull over the difficult times and make resolutions that we intend to carry through in the upcoming year.

Read More

Topics: data breach

How to Prepare for (and Avoid) Software Audits

Posted by GlassHouse Systems on Dec 13, 2018 3:08:52 PM

Complex and highly interpretive, software audits are like an evil spirit that can cast a gloomy shadow on any organization’s profitability and reputation. However, as CIOs and IT specialists, you would know that if your company licenses any software, it is only a matter of time before the vendor sends you an audit notification. Larger players, such as Microsoft, SAP, Adobe, IBM and Oracle are known to send out frequent audit requests to their customers. In fact, given the surge in the use of multiple technologies and hybrid environments, many of these companies see software audits as a mainstream revenue generation mechanism.

Read More

Topics: SAM, software asset management, software audit defense

How to Budget for Cybersecurity in 2019

Posted by GlassHouse Systems on Dec 10, 2018 12:08:06 PM

While information security threats continue to multiply and data breaches take on never-seen-before levels, cybercrime issues are worsening in both, scale and depth. With the backing of cartels and mafia, hackers have greater access to resources, and are leading increasingly sophisticated attacks. Unfortunately, that means the lifeblood of the new digital economy, data and information, needs to be continually guarded and secured. As CIOs and CXOs, you want to ensure that your company invests in the best possible safeguards and systems to avoid being exploited at the hands of cybercriminals. Hence, budgeting for them correctly should be your priority.

Read More