May 31, 2022
Achieving Digital Trust Across Your Business Applications
When consumers decide to use a company’s product or service, they are consciously or subconsciously confirming their digital trust in…...
Learn MoreMay 4, 2022
Eight Key Investments for An Effective Data Privacy Risk Program
As a Certified Data Privacy Solution Engineer, I have led hundreds of data privacy risk assessment and remediation services across…...
Learn MoreApril 14, 2022
[Appsian Insights] Using Internal Controls to Ensure Data Security and Audit Readiness
Appsian’s Vice President of Product Strategy & Customer Experience, David Vincent, appears in the latest episode of the Business Class…...
Learn MoreApril 4, 2022
What Is Oracle Access Management?
Oracle Access Management offers single sign-on (SSO) and multi-factor authentication (MFA) that integrate systems and identities across on-premises and cloud…...
Learn MoreApril 4, 2022
Understanding Different Oracle IAM Solutions And Their Capabilities
Oracle provides capabilities for managing the entire lifecycle of user identities and entitlements across multiple environments, including on-premises data centers…...
Learn MoreApril 4, 2022
Oracle LDAP Integration With Oracle Internet Directory: An Overview
How Does Oracle Internet Directory Provide LDAP Capabilities? If you have an existing LDAP infrastructure in your organization and want…...
Learn MoreFebruary 8, 2022
[Video] Best Practice Tips for Periodic User Access Reviews in ERP Systems
Unauthorized access is a significant but preventable threat to an organization. Periodic User Access Reviews help you identify redundant or…...
Learn MoreFebruary 7, 2022
3 Pieces of Advice to Help You Prepare for Cyber Attacks of the Future
The following is an excerpt from an interview by Panther with David Vincent, Appsian’s Chief Security Evangelist and VP of…...
Learn MoreFebruary 4, 2022
[Video] Best Practice Tips for ERP Data Monitoring
Whatever the size and nature of your organization, you’re not immune to the consequences of fraudulent activity. Fraud can have…...
Learn MoreFebruary 2, 2022
[Video] Best Practice Tips for ERP Security Assessments
Your ERP system is one of your most valuable corporate assets. Unfortunately, weaknesses in its security could lead to all…...
Learn MoreFebruary 1, 2022
[Video] Best Practice Tips for Designing Compensating Controls in ERP Systems
Organizations use Segregation of Duties (SoD) to reduce the risk of fraud, operational errors, misuse of information, and other security…...
Learn MoreJanuary 26, 2022
[Video] Best Practice Tips for Audit Reporting in ERP Systems
Raise your hand if you're looking forward to your next audit. Anybody? An audit can be a very stressful experience.…...
Learn MoreJanuary 25, 2022
[Video] Best Practices for ERP Data Privacy
Your organization is likely using an ERP system (or more than one) such as PeopleSoft, SAP ECC, S/4HANA, Oracle E-Business…...
Learn MoreJanuary 24, 2022
[Video] Best Practice Tips for Role Design in ERP Systems
A well-designed and well-executed role structure is the cornerstone of an efficient, sustainable security model in your ERP system. Poor…...
Learn MoreDecember 21, 2021
7 Essential Capabilities to Consider When Evaluating ERP Security, Risk, and Compliance Solutions
Organizations looking to secure their ERP's security defenses are often required to sort through vendor claims of features that are…...
Learn MoreDecember 15, 2021
7 Proven Benefits of the COSO Framework
What is COSO? In 1985, five private sector organizations formed a joint initiative to combat corporate fraud. These organizations are…...
Learn MoreNovember 29, 2021
[ERP Market Insights] A Closer Look at the Adaptive Security Model
This is the online edition of the ERP Market Insights Newsletter by David Vincent. Agility is the name of the game in today’s ERP data…...
Learn MoreNovember 22, 2021
What is Continuous Adaptive Risk and Trust Assessment (CARTA) and Why You Can’t Depend on Just RBAC Anymore
Organizations rely on the static, role-based access control (RBAC) security model that came with most ERP applications to safeguard their…...
Learn MoreNovember 18, 2021
Why Role-Based Access Control Is Not Enough for Effective Policy Management
A policy is a deliverable from the governance function created by senior executives to establish measurable guidelines and expectations for…...
Learn MoreNovember 8, 2021
How to Choose the Right Identity & Access Governance Solution for your Organization
According to the NIST Cybersecurity Framework, the ability to identify, detect, prevent, respond, and recover are important control capabilities for organizations to…...
Learn MoreOctober 29, 2021
3 Internal Control Deficiencies that Could Lead to Material Weaknesses In SAP
In response to the various risk and compliance regulations worldwide, independent auditors are testing for effective internal controls and holding…...
Learn MoreOctober 29, 2021
3 Essential Capabilities You Need to Modernize Your ERP Security and Compliance
The fundamental goal of information security has long been to effectively maintain confidentiality, integrity, and availability. Confidentiality ensures that information…...
Learn MoreOctober 12, 2021
5 Proven Internal Control Strategies to Prevent Fraud and Building Effective Fraud Management Plan
Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association…...
Learn MoreOctober 6, 2021
6 Warning Signs Of Potential Insider Threat Activity And How To Detect Them
Data breaches caused by ransomware attacks, phishing scams, and state-sponsored hacker groups tend to grab the headlines. However, the reality…...
Learn MoreOctober 5, 2021
NIST Cybersecurity Framework Executive Summary And Overview
As cyberattacks across the world increase in frequency and sophistication, companies are constantly working to improve detection capabilities, discover hidden…...
Learn MoreStart your free demo
"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"
Trusted by hundreds of leading brands