<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / risk</title>
<link>http://netvouz.com/lillymark/tag/risk?feed=rss</link>
<description>lillymark&#39;s bookmarks tagged &quot;risk&quot; on Netvouz</description>
<item><title>Identity Access Management Empowering Global Business</title>
<link>http://www.greendoc.net/view/568337/identity_access_management_empowering_global_business</link>
<description>Today global expansion has become the norm to stay in the aggressively competitive world, requiring enterprises to manage large consumer base and businesses to expand their transactions network.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 05 Jun 2013 07:46:48 GMT</pubDate>
</item><item><title>Webinar on The Changing Compliance Needs for Open Source Software</title>
<link>http://www.aujas.com/webinar/july-2012/</link>
<description>In this webinar Palamida CEO, Mark Tolliver will discuss how the compliance landscape is changing as these open source and commercial options multiply. We will discuss terminology, common pitfalls, open source and commercial license issues, as well as ways to mitigate these issues.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 11 Jul 2012 09:35:05 GMT</pubDate>
</item><item><title>“Deloitte Tech Fast 50 India 2013” belongs to Aujas for the consecutive third time</title>
<link>http://www.moneylife.in/business-wire-news/aujas-wins-deloitte-tech-fast-50-india-2013-third-time-in-a-row/36999.html</link>
<description>Aujas today announced that it ranked Number 26 on the Deloitte Technology Fast 50 India 2013 organised by Deloitte Touche Tohmatsu India Private Limited, a ranking of the 50 fastest growing technology companies in India.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 23 Oct 2013 08:48:01 GMT</pubDate>
</item><item><title>2012’s 10 Largest Data Breaches</title>
<link>http://www.egestalt.com/blog/2012/06/08/2012-10-largest-data-breaches/</link>
<description>We’re hardly half-way through 2012, and the year has witnessed a heaving number of data breaches already! Ranging from data theft and negligence to disgruntled employees and carelessness, a wide range of data breaches has been noted so far, and the problem seems to be only growing.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 11 Jun 2012 11:14:44 GMT</pubDate>
</item><item><title>24/7 Security Monitoring for Effective Risk and Compliance Management</title>
<link>http://egestalt.wikispaces.com/24-7+Security+Monitoring+for+Effective+Risk+and+Compliance+Management</link>
<description>Technological growth has enabled enterprises across industries to profit from business expansions, communicate through networked environment, transfer and store data in digital form for easy access ensuring business continuity even in face of natural calamities.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 31 Jul 2014 11:23:33 GMT</pubDate>
</item><item><title>A Big Lesson to Learn from the Alaska DHSS Breach</title>
<link>http://www.egestalt.com/blog/2012/09/20/a-big-lesson-to-learn-from-the-alaska-dhss-breach/</link>
<description>A number of data breaches have been reported in the recent past, and every breach incident has a lesson to teach organizations that do not take HIPAA compliance seriously. This holds true even with the recent breach involving the Alaska Department of Health and Social Services (DHSS).</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 24 Sep 2012 11:02:20 GMT</pubDate>
</item><item><title>A Quick Test to find out if your Company is really serious about Security</title>
<link>http://blog.aujasnetworks.com/quick-test-find-company-security.html</link>
<description>LinkedIn – the popular social media network – recently confirmed that a breach of its network has compromised hashed passwords associated with its accounts. News reports estimate almost 6.5 million passwords have been compromised.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 19 Jun 2012 07:26:22 GMT</pubDate>
</item><item><title>A Right Approach to Cyber Security</title>
<link>http://www.egestalt.com/blog/2014/06/05/a-right-approach-to-cyber-security/</link>
<description>A recent PWC survey reveals that nearly 62 percent of organizations do not have an appropriate structure in place to prioritize security investments based on impact and risk.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 06 Jun 2014 10:10:17 GMT</pubDate>
</item><item><title>A Secure Framework with Mobile Security Services</title>
<link>http://www.articleblast.com/Computers_and_Internet/General/A_Secure_Framework_with_Mobile_Security_Services/</link>
<description>The globalized business world with its highly networked environment makes use of the best of the breed technology solutions and world class infrastructure to cater to the requirements of a widespread workforce and large customer base.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 01 Jan 2013 06:09:16 GMT</pubDate>
</item><item><title>Add Value to Enterprise Risk Management Using IAM Solutions</title>
<link>http://amynn.posterous.com/add-value-to-enterprise-risk-management-using-44698</link>
<description>Compliance requirements and corporate security mandates are important drivers for Identity Access Management (IAM). Internal policy enforcement is the primary focus for big companies, and according to  Forrester, context-driven IAM is going to be the market force in the future years.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 26 Apr 2013 09:25:57 GMT</pubDate>
</item></channel></rss>