InfoSec Rush To Safety Series: Include Your Team

Your company takes security seriously, but is your Company taking your InfoSec Teams’ suggestions seriously? One of the things that 2020 is showing us is that we certainly need to take our InfoSec Pros seriously. Cybercrime and ransomware have particularly risen in the last 6 months and we need to make sure everyone can speak up and eliminate or at least minimize exposure to those risks.

Continue reading

InfoSec Rush to Safety Series

In light of the pandemic coming to a close sometime in 2021, we expect that some people will start coming back to work to their office locations. This not only imposes a new reality on the overall social aspects, architecture, and office layout but also poses some challenges on the InfoSec front. Over the next few articles, we will be focusing on the upcoming rush to achieve a secure level of compliance.

Continue reading

Zero Trust Security Model – Explained

In the 1990s

There was no concept of Zero Trust Security Model because it was not needed, the only attack vector was physical access. The majority of computing devices were connected to local networks. LANs were considered secure for several reasons, especially for sitting behind a layer of physical security. Most of the connected devices were desktops and had a network wire sticking out their back panel.

Continue reading

Cloud RPA services integration

Following up on the previous article RPA Doesn’t Care Who Your Cloud Service Vendor Is a few questions may come to mind when thinking a bit deeper into cloud RPA services integration. Those questions are still related to how third-party cloud services may integrate into your RPA vendor of choice. While the answer is that your RPA cloud vendors can integrate with anything, let’s clarify some of those concerns. Read on for those questions and their corresponding answers.

Continue reading

The Discovery Process in RPA – Learn the basics

A big part of business continuity is to provide a constant stream of potential projects. This task is called the “Discovery Process.” RPA is no different. In RPA’s context, you will need to discover those new processes. Once a Center of Excellence (CoE) is up and running, the most significant goal they will have is to propose and keep finding processes to automate. Read on to see how the discovery process works in RPA.

Continue reading

Let’s Talk About Cybersecurity

Cybersecurity is the general concept that groups different types of electronic security awareness, methodologies, preventive, and reactive actions to protect data you hold, send, and receive. Implemented cybersecurity preventive measures allow you to counter unauthorized access to your data and your Customer’s information. Those attempts can come both from inside and outside of your team and can be intended or unintended.

Continue reading

Staying Relevant and Competitive

Technology evolves at a much faster pace than we can typically manage. We all have our continuous learning processes. We try to keep current, relevant, and competitive. Some days it feels like we are just trying to drink from a firehose. Staying relevant and competitive is a challenge, but with the right tools, BlueKatana can help your company increase productivity, stay relevant, and become a more efficient competitor in the market.

Continue reading

What Is Series – RPA Is Good For Jobs

Those who have only a superficial understanding of RPA think that RPA eliminates jobs. RPA deepens the relationship between the Enterprise and the knowledge workers from which it depends. Knowledge workers get more experienced and become more knowledgeable about what they do. Thanks to RPA, knowledge workers come closer to becoming citizen developers. Their knowledge of business processes allows them to implement them in an RPA platform and increase their productivity 10, 100, or even 1000 times their level before implementing RPA. Read on to learn about why RPA is good for jobs and how it transforms how you work in another edition of the What is Series.

Continue reading