Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Manage 'Execute as Admin' Workflows in NetSuite

Last week, in response to an increasing number of questions from our NetSuite customers, we showed you how to manage scripts that execute in the Administrator role. One thing it didn’t cover, however, was workflows that execute as Administrator. The process for resolving this with Netwrix Strongpoint or Flashlight is similar — but there are some additional considerations that merit discussion in this post, particularly if you want to avoid material deficiencies on audit.

A 'Deep Clean' for Your Org: Salesforce Data Cleansing and Metadata Cleanup

As your business grows, so will your Org. And while a highly customized Salesforce Org reflects a booming business, there’s a critical difference between necessary complexity and technical debt. In the spirit of spring cleaning, we wanted to share two strategies for reducing technical debt: Salesforce data cleansing, and cleaning up unnecessary customizations and metadata in your Org. Both go hand-in-hand in improving usability and adoption.

Dirty Data and Technical Debt: How to Clean Up NetSuite

As you work in NetSuite and evolve your account over time, you’re going to accumulate some baggage. Typically, this baggage will come in two forms: ‘dirty’ data housed in the system, and obsolete metadata (system customizations), aka technical debt. Though these are two separate issues, they’re closely related — getting rid of technical debt will make your NetSuite account easier to use, which will improve the overall quality of the data within it.

Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)

Cybersecurity researchers recently uncovered a critical flaw in the widely used Apache OFBiz Enterprise Resource Planning (ERP) system, CVE-2023-51467. The zero-day vulnerability CVE-2023-51467 poses a significant threat, boasting a CVSS score of 9.8. This authentication bypass vulnerability stems from an incomplete patch for a previously disclosed Pre-auth Remote Code Execution (RCE) vulnerability, CVE-2023-49070.

Remote Access and Cybersecurity Exposure

Between cloud storage and smart devices, remote access to various services has become a mundane fact of life. Remote access empowers software developers and system administrators to manage technical infrastructure without requiring physical access to the server, which supports cloud-based services. Remote desktop solutions can also aid remote users with troubleshooting.

Building a Shadow IT Policy: What CEOs, CTOs, and CISOs Need to Know

The problem with shadow IT isn’t really the need for new tools, it’s the fact that people use them without IT security teams knowing. This usually happens because they perceive security policies as restrictive and antagonistic toward their productivity. In this way, Shadow IT is a process issue—not a software issue. Hidden risk is increasingly challenging cybersecurity leaders as digital supply chains grow and more apps are added to the network.

3 Ways to Navigate the Challenges of Australian IRAP Assessments

Compliance is a cornerstone for organisations, especially in countries such as the United States. One would expect that mature US-based organisations would be well-versed in navigating compliance-based frameworks, ensuring their operations align with established standards. However, when these same US-based organisations seek to align their systems with the Australian Government, a challenging mindset shift is often required to adhere to a more risk-focused approach.

The Road Ahead: What Awaits in the Era of AI-Powered Cyberthreats?

Artificial intelligence (AI) is rapidly infiltrating the business world and our daily lives. While revolutionizing how – and how efficiently – work gets done, it also introduces a new set of cybersecurity challenges. In response to the evolving, AI-shaped threat landscape, I foresee organizations adopting robust countermeasures.