Thought Leadership

 

May 31, 2022
Achieving Digital Trust Across Your Business Applications

When consumers decide to use a company’s product or service, they are consciously or subconsciously confirming their digital trust in…...

Learn More
May 4, 2022
Eight Key Investments for An Effective Data Privacy Risk Program

As a Certified Data Privacy Solution Engineer, I have led hundreds of data privacy risk assessment and remediation services across…...

Learn More
April 14, 2022
[Appsian Insights] Using Internal Controls to Ensure Data Security and Audit Readiness

Appsian’s Vice President of Product Strategy & Customer Experience, David Vincent, appears in the latest episode of the Business Class…...

Learn More
April 4, 2022
What Is Oracle Access Management?

Oracle Access Management offers single sign-on (SSO) and multi-factor authentication (MFA) that integrate systems and identities across on-premises and cloud…...

Learn More
April 4, 2022
Understanding Different Oracle IAM Solutions And Their Capabilities

Oracle provides capabilities for managing the entire lifecycle of user identities and entitlements across multiple environments, including on-premises data centers…...

Learn More
April 4, 2022
Oracle LDAP Integration With Oracle Internet Directory: An Overview

How Does Oracle Internet Directory Provide LDAP Capabilities? If you have an existing LDAP infrastructure in your organization and want…...

Learn More
February 8, 2022
[Video] Best Practice Tips for Periodic User Access Reviews in ERP Systems

Unauthorized access is a significant but preventable threat to an organization. Periodic User Access Reviews help you identify redundant or…...

Learn More
February 7, 2022
3 Pieces of Advice to Help You Prepare for Cyber Attacks of the Future

The following is an excerpt from an interview by Panther with David Vincent, Appsian’s Chief Security Evangelist and VP of…...

Learn More
February 4, 2022
[Video] Best Practice Tips for ERP Data Monitoring

Whatever the size and nature of your organization, you’re not immune to the consequences of fraudulent activity. Fraud can have…...

Learn More
February 2, 2022
[Video] Best Practice Tips for ERP Security Assessments

Your ERP system is one of your most valuable corporate assets. Unfortunately, weaknesses in its security could lead to all…...

Learn More
February 1, 2022
[Video] Best Practice Tips for Designing Compensating Controls in ERP Systems

Organizations use Segregation of Duties (SoD) to reduce the risk of fraud, operational errors, misuse of information, and other security…...

Learn More
January 26, 2022
[Video] Best Practice Tips for Audit Reporting in ERP Systems

Raise your hand if you're looking forward to your next audit. Anybody? An audit can be a very stressful experience.…...

Learn More
January 25, 2022
[Video] Best Practices for ERP Data Privacy

Your organization is likely using an ERP system (or more than one) such as PeopleSoft, SAP ECC, S/4HANA, Oracle E-Business…...

Learn More
January 24, 2022
[Video] Best Practice Tips for Role Design in ERP Systems

A well-designed and well-executed role structure is the cornerstone of an efficient, sustainable security model in your ERP system. Poor…...

Learn More
December 21, 2021
7 Essential Capabilities to Consider When Evaluating ERP Security, Risk, and Compliance Solutions

Organizations looking to secure their ERP's security defenses are often required to sort through vendor claims of features that are…...

Learn More
December 15, 2021
7 Proven Benefits of the COSO Framework

What is COSO?   ​In 1985, five private sector organizations formed a joint initiative to combat corporate fraud. These organizations are…...

Learn More
November 29, 2021
[ERP Market Insights] A Closer Look at the Adaptive Security Model

This is the online edition of the ERP Market Insights Newsletter by David Vincent.   Agility is the name of the game in today’s ERP data…...

Learn More
November 22, 2021
What is Continuous Adaptive Risk and Trust Assessment (CARTA) and Why You Can’t Depend on Just RBAC Anymore

Organizations rely on the static, role-based access control (RBAC) security model that came with most ERP applications to safeguard their…...

Learn More
November 18, 2021
Why Role-Based Access Control Is Not Enough for Effective Policy Management

A policy is a deliverable from the governance function created by senior executives to establish measurable guidelines and expectations for…...

Learn More
November 8, 2021
How to Choose the Right Identity & Access Governance Solution for your Organization

According to the NIST Cybersecurity Framework, the ability to identify, detect, prevent, respond, and recover are important control capabilities for organizations to…...

Learn More
October 29, 2021
3 Internal Control Deficiencies that Could Lead to Material Weaknesses In SAP

In response to the various risk and compliance regulations worldwide, independent auditors are testing for effective internal controls and holding…...

Learn More
October 29, 2021
3 Essential Capabilities You Need to Modernize Your ERP Security and Compliance

The fundamental goal of information security has long been to effectively maintain confidentiality, integrity, and availability. Confidentiality ensures that information…...

Learn More
October 12, 2021
5 Proven Internal Control Strategies to Prevent Fraud and Building Effective Fraud Management Plan

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association…...

Learn More
October 6, 2021
6 Warning Signs Of Potential Insider Threat Activity And How To Detect Them

Data breaches caused by ransomware attacks, phishing scams, and state-sponsored hacker groups tend to grab the headlines. However, the reality…...

Learn More
October 5, 2021
NIST Cybersecurity Framework Executive Summary And Overview

As cyberattacks across the world increase in frequency and sophistication, companies are constantly working to improve detection capabilities, discover hidden…...

Learn More

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands