SECURE Communications

April 1, 2018

CallTrackingMetrics’ (CTM’s) Security and Privacy Program follows a streamlined framework based on NIST 800-30 Rev. 1 guidance. The program was initially developed to adhere to the the Meaningful Use criteria and the HIPAA HITECH Express regulations. In early 2018, in addition to our HIPAA focused risk management work, we have also included a thorough review of the upcoming GDPR regulations to prepare for the regulation when it becomes enforceable on May 25, 2018.

Spotlight

Osirium

In the current world of outsourcing, it can be hard to see who has privileged access to what on your systems. These days, the lowest paid people have the highest privileges - and they may not even work for your organisation. Osirium readdresses this balance for end-user organisations and uniquely allows MSSPs to manage tens of thousands of account credentials, outsource safely and keep their clients happy on the compliance front. Our approach gives speed to value, enabling organisation to see results as quickly as required. Osirium prevents attacks on Privileged Accounts by separating people from passwords. Those privileged passwords never enter any workstation, they undergo Enterprise Class Password Life Cycle Management. We can build a least privileged model by removing the need for direct system access using Privileged Task Automation. Add Session Recording to allow you to see who did what, where and when.

OTHER WHITEPAPERS
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More

Spotlight

Osirium

In the current world of outsourcing, it can be hard to see who has privileged access to what on your systems. These days, the lowest paid people have the highest privileges - and they may not even work for your organisation. Osirium readdresses this balance for end-user organisations and uniquely allows MSSPs to manage tens of thousands of account credentials, outsource safely and keep their clients happy on the compliance front. Our approach gives speed to value, enabling organisation to see results as quickly as required. Osirium prevents attacks on Privileged Accounts by separating people from passwords. Those privileged passwords never enter any workstation, they undergo Enterprise Class Password Life Cycle Management. We can build a least privileged model by removing the need for direct system access using Privileged Task Automation. Add Session Recording to allow you to see who did what, where and when.

Events