Monthly Archives: October 2016

Tackling Procurement Challenges in the Supply Chain
Posted by

Tackling Procurement Challenges in the Supply Chain

Globalization and regulation, coupled with inadequate investment in compliance programs and third-party risk management programs, are making the proactive identification and resolution of risks posed by suppliers a challenging task. Companies that don’t face up to the challenge run the risk of non-compliant products in their supply chain, and can face serious brand and reputational […]

How Estimating ROI for Adopting Technology Can Help Streamline Supplier Quality
Posted by

How Estimating ROI for Adopting Technology Can Help Streamline Supplier Quality

Organizations have certain expectations and apprehensions when adopting a technology solution for suppliers. When it comes to automating a process, in terms of its usability, its benefits, and of course, returns in lieu of the investments made, it is common to see tensions rising high within your organization. However, such a solution would not only […]

Ensuring Resilient Cyber Safeguards in Cloud Applications
Posted by

Ensuring Resilient Cyber Safeguards in Cloud Applications

Assessing Cloud Application Vendors from a Security Perspective Enterprises of all structures and sizes across the globe have been adopting cloud for all needs – for computing, storage, databases, to hosting business applications. They are also proactively addressing cyber-security needs – both as dictated by internal Info-Sec controls, as well as those coming from external regulatory mandates. For enterprises […]

What Startups Can Do About Cyber Attacks
Posted by

What Startups Can Do About Cyber Attacks

A cybersecurity report by Ponemon Institute, in association with Keeper Security, found that in the 12 months leading up to June 2016, 55 percent of small and medium-sized businesses (SMBs) experienced a cyber attack, while 50 percent encountered data breaches involving customer and employee information. These statistics belie the common notion that cybercriminals attack only […]