Move Aside Cloud, Blockchain is the Newest ERP Trend

Move Aside Cloud, Blockchain is the Newest ERP Trend

On January 10, 2018, Geoprise Technologies Corporation, the maker of GM-X ERP, announced that it has partnered with Coin Sciences Ltd, maker of the MultiChain blockchain platform, to launch an ERP application leveraging blockchain technology to enable secure business-to-business collaboration and others are quickly following suit. Let’s take a step back to understand what blockchain is and...

Read More
How to Mitigate Spectre/Meltdown Vulnerabilities

How to Mitigate Spectre/Meltdown Vulnerabilities

Organizations must consider their strategy for deploying Windows Updates to mitigate the Meltdown and Spectre Spectre/Meltdown vulnerabilities. This blog is specifically related to a new gotcha clients may need to address in order to successfully deploy the Microsoft hotfixes that help mitigate these vulnerabilities. It’s important to call out a key behavioral change in the way Microsoft is...

Read More
Cybersecurity in the Age of Digital Transformation

Cybersecurity in the Age of Digital Transformation

Customer experience (CX) in the utility industry is undergoing dramatic change. Customers want more access to information, more choices to access information (such as mobile and social media) and enhanced ability to manage costs. To meet this need, utility companies are striving to engage their customers using data analytics, monitoring and control in the modern ecosystem of Internet of Things...

Read More
Meltdown and Spectre: What You Need to Know

Meltdown and Spectre: What You Need to Know

What does it mean when I hear about the Spectre and Meltdown vulnerabilities? In simple terms, these vulnerabilities allow unauthorized access to sensitive memory content on computing systems that should never be allowed. Successful exploitation of these vulnerabilities can compromise the core system integrity and all multi-tenant users or processes on a system; think public/private clouds...

Read More
Let’s Talk Basic Cryptocurrency Security: How to Keep Your Coins With You in a More Secure Environment

Let’s Talk Basic Cryptocurrency Security: How to Keep Your Coins With You in a More Secure Environment

With all the recent attention, and value generation, from cryptocurrencies as of late (pick your favorite: Bitcoin, Ethereum, Litecoin, and more!), the Blockchain team at West Monroe Partners felt it’s important to remind our readers on how to keep your Bitcoins safe, and of a crucial security component: establishing your own digital wallet.…

Read More
What’s Your Cloud Security Foundation?

What’s Your Cloud Security Foundation?

Cloud implementation and migration projects create ample opportunity for mistakes when it comes to the management of security controls in the new environment. This was demonstrated in dramatic fashion recently with the news that Viacom cloud configuration secrets had been exposed on the public internet due to misconfigured S3 bucket permissions.…

Read More
Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Despite Heightened Attention To Cybersecurity Risks, Today’s Software Investors Don’t Feel Any Better Prepared

Despite Heightened Attention To Cybersecurity Risks, Today’s Software Investors Don’t Feel Any Better Prepared

During the first half of 2017, West Monroe and Mergermarket surveyed 100 senior private equity and corporate executives, all with organizations that have acquired at least one software firm over the past three years. Respondents cited various challenges to orchestrating a successful acquisition – one of the top among them being cybersecurity.…

Read More
When Information Security Begins at Swim Lessons

When Information Security Begins at Swim Lessons

In my role as leader of West Monroe’s Performance Services practice, I advise clients on how they can improve their infrastructure, application, and security management practices.  Increasingly, those conversations focus on improving overall security posture. We believe a strong security program begins with the business strategy – understanding the risks the business faces as it relates to...

Read More
Office 365 vs. G Suite: The dilemma of choosing between the behemoths and the benefits of Office 365

Office 365 vs. G Suite: The dilemma of choosing between the behemoths and the benefits of Office 365

Those who remember Microsoft’s Business Productivity Online Suite (BPOS) understand why there was such an interest in the release of Google Apps vs Office 365. Since their initial release, Google Apps has bloomed into G Suite and BPOS has evolved into Office 365. Both of which are capable of hosting a cloud based collaboration solution for companies of any size.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons