Analytics
10/29/2013
06:54 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

New 'Whistleblower' Portal Lets User Report Incidents Anonymously

GRC Vendor LockPath offers whistleblower portal to let users anonymously report complaints, security violations

A new Web-based portal could offer employees and other users an anonymous method of reporting complaints or security violations in their enterprises without fear of reprisal.

LockPath, a maker of governance, risk, and compliance (GRC) technology, on Monday rolled out the Anonymous Incident Portal, a cloud-based service that lets users submit complaints, violations, or other concerns without giving away their identities.

The new portal was unveiled in conjunction with LockPath's release of Keylight 3.5, LockPath's new hybrid cloud GRC offering, which helps companies automate the security and compliance assessment of suppliers and business partners.

"The Anonymous Incident Portal is a way for employees to let someone know if they see something," says Chris Caldwell, CEO of LockPath. "It could be a physical security violation, or an IT security violation, a violation of a financial process, or any number of incidents. The key is that there is a secure and anonymous way to do it."

Some companies have anonymous "whistleblower hotlines," and the state of New York is considering a law that would help reward and protect whistleblowers, Caldwell observes.

While organizations may not be happy to have employees blow the whistle on potential violations, having them submit their complaints on a secure portal is better than having them dump information to WikiLeaks or give documents to the media, as Edward Snowden did to the NSA, LockPath states. The AIP also gives employees a way to flag incidents to their companies before reporting them to the Securities Exchange Commission (SEC) or other regulatory and law enforcement organizations.

"Employees often struggle with deciding when to report an incident and when to remain quiet given potential repercussions like harassment by the business, a career-limiting move, or termination," adds Caldwell. "AIP eliminates this fear by providing an anonymous and secure portal to express concerns, which can ultimately create an improved working environment for employees and ensure that a company's reputation is in its own hands, rather than in the hands of someone else."

LockPath's new Keylight 3.5 offering also includes Vendor Manager Hybrid, a new capability that allows third parties to submit audit-related questionnaires through a Web-based portal, bypassing the assessing organization's corporate network.

The new offering is designed to help companies ensure compliance among vendors and business partners, as well as internally, Caldwell says.

"LockPath has always helped customers manage relationships with third parties to ensure compliance," Caldwell states. "From law firms to financial institutions to health-care providers, organizations must regularly work with other vendors to complete due diligence in order to meet industry standards and regulations. This new offering lets organizations keep control of their sensitive data within the enterprise, while maintaining effective interactions with outside entities."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.