Analytics
10/29/2013
06:54 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

New 'Whistleblower' Portal Lets User Report Incidents Anonymously

GRC Vendor LockPath offers whistleblower portal to let users anonymously report complaints, security violations

A new Web-based portal could offer employees and other users an anonymous method of reporting complaints or security violations in their enterprises without fear of reprisal.

LockPath, a maker of governance, risk, and compliance (GRC) technology, on Monday rolled out the Anonymous Incident Portal, a cloud-based service that lets users submit complaints, violations, or other concerns without giving away their identities.

The new portal was unveiled in conjunction with LockPath's release of Keylight 3.5, LockPath's new hybrid cloud GRC offering, which helps companies automate the security and compliance assessment of suppliers and business partners.

"The Anonymous Incident Portal is a way for employees to let someone know if they see something," says Chris Caldwell, CEO of LockPath. "It could be a physical security violation, or an IT security violation, a violation of a financial process, or any number of incidents. The key is that there is a secure and anonymous way to do it."

Some companies have anonymous "whistleblower hotlines," and the state of New York is considering a law that would help reward and protect whistleblowers, Caldwell observes.

While organizations may not be happy to have employees blow the whistle on potential violations, having them submit their complaints on a secure portal is better than having them dump information to WikiLeaks or give documents to the media, as Edward Snowden did to the NSA, LockPath states. The AIP also gives employees a way to flag incidents to their companies before reporting them to the Securities Exchange Commission (SEC) or other regulatory and law enforcement organizations.

"Employees often struggle with deciding when to report an incident and when to remain quiet given potential repercussions like harassment by the business, a career-limiting move, or termination," adds Caldwell. "AIP eliminates this fear by providing an anonymous and secure portal to express concerns, which can ultimately create an improved working environment for employees and ensure that a company's reputation is in its own hands, rather than in the hands of someone else."

LockPath's new Keylight 3.5 offering also includes Vendor Manager Hybrid, a new capability that allows third parties to submit audit-related questionnaires through a Web-based portal, bypassing the assessing organization's corporate network.

The new offering is designed to help companies ensure compliance among vendors and business partners, as well as internally, Caldwell says.

"LockPath has always helped customers manage relationships with third parties to ensure compliance," Caldwell states. "From law firms to financial institutions to health-care providers, organizations must regularly work with other vendors to complete due diligence in order to meet industry standards and regulations. This new offering lets organizations keep control of their sensitive data within the enterprise, while maintaining effective interactions with outside entities."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.