HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Risk Management News & Analysis

Ex-Ektron Pres Tim McKinnon Now Sonian CEO

Tim McKinnon — the man who steered Ektron through its merger with EPiServer before leaving the company himself — started a new job this week. And he said he couldn't be more excited about the opportunity to take the helm of a small but growing company.

The former Ektron president is now president and CEO of Sonian, a Dedham, Mass-based provider of cloud-based archiving. Founded in 2007, the company helps businesses preserve, retrieve and "bring meaning to their vast expanse of data," McKinnon claims.

"It's a perfect fit," McKinnon told CMSWire today. "It matches what I like to do with what the company needs."

Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

2015-07-April-Gorilla.jpg

Where does an 800 pound gorilla sit?

Anywhere it wants.

And in the case of Lexmark, it wants to sit in the enterprise software space.

Brian Anderson, Chief Technology Officer for enterprise software at Lexmark, told CMSWire that the combination of Lexmark's hardware business, plus the enterprise content management capabilities gained through its 2010 Perceptive buy, plus the business process management spoils from its recent Kofax acquisition will turn Lexmark into an 800 pound gorilla.

We're All In This Together: Share Your Cybercrime Stories

2015-27-March-horses-talking.jpg

What's the best defense against cybercrime? Surprisingly, it might be a big mouth.

Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.

Think of what's happened in just the past few days. Congress has moved forward legislation that would encourage information-sharing in the financial sector. The retail industry has introduced a portal for this same purpose. And a security company has introduced a new product that uses shared information as its base.

It is quite the turnaround from a few years ago when such information was carefully hoarded. Back then, if an attack occurred, it was only reluctantly shared with customers and competitors.

The Continued Failure of Risk Management Practices

Risk management is not about avoiding failure -- it is about achieving success.

The ERM Initiative at North Carolina State University, led by Mark Beasley, has published its sixth report on the state of risk management. I saw the first report in 2010 and frankly, not much has changed.

10 Years in Cyberspace Security

2015-03-March-Secure.jpg

Ten years ago, I wrote a paper on the future of cyberspace. In it, I pointed to three areas that we needed to address to make cyberspace safe for information sharing: establishing strong cyber-trust, enabling secure mobility and striking a balance between security and privacy rights.

So much has changed since then. Or has it?

Fed Cybersecurity Summit: Assessing Risks, Looking for Solutions

Here’s something to think about the next time your team crafts an email marketing message. "About two thirds of cyber attacks start with an email," said Patrick Peterson, founder and CEO of San Mateo, Calif.-based Agari, a security solutions provider.  

Email is the foundation of digital, added Agari CMO Kevin Cochrane. "And the more we go digital, the more we put ourselves at risk. I think people are just realizing. It's a problem that needs fixing — now," Cochrane said.

In a conversation with CMSWire today from the first ever White House Summit on Cybersecurity and Consumer Protection on the Stanford University campus, Peterson and Cochrane said it was time to acknowledge the potential risks of the Digital Age.

While Peterson cautioned that there was no reason to panic about the growing threats of cybercrime, he stressed that it was time to face facts, accept reality and "be mindful" about potential dangers.

"In a digital, connected world full of stronger and stronger adversaries, the risks are extreme," he said. One of the biggest risks, he added, is a collective loss of trust in the digital economy.

Better Safe than Sorry: Protecting Online Identity

Anyone who's made a purchase -- whether in-store or online -- within the last few years knows that providing an email address has become a standard part of doing business in the United States.

Plan for Migration Success with Search

2015-11-February-Home-Moving.jpg

Migrating a website or an intranet to a new CMS or new information architecture comes with considerable challenges. Automated tools can support the process, but almost inevitably a great deal of discussion and work will need to take place around specific areas of the site. Having information management policies and strategies in place goes a long way in helping to define content quality, metadata and a taxonomy for the new site. Moving file shares and other repositories into a cloud storage and application environment such as Google Drive has emerged as another requirement.

Effective search will play a vital role in adoption if the migration results in any changes to the intranet structure, and will continue to do so until users have found their way around the information architecture (IA), new content types and repositories.

The 2 Irresistible Forces of Enterprise Mobility

2015-5-february-blue-angel1.jpg

“What happens when an irresistible force meets an immovable object?” I was a teenager when I first heard this question. It was an interesting thought exercise at the time, but the practical application in business is more about two forces that go in different directions. For an example, look no farther than when an IT leader sees things differently than a business leader.

Embrace and Embody Risk Management

If a CEO wants his organization to realize the opportunity presented by risk management to deliver better decisions and, through them, improved performance, he needs to do more than “walk the talk.”

I have come up with the phrase “embrace and embody” risk management. (Feel free to borrow it.)

Bug Bounty Programs Help Companies Track Vulnerabilities

2015-3-february-giant-ant-from-WB-movie-them.jpg

Companies release new software and products to corporate users and consumers, hoping final product releases are stable and free of bugs.

But it's much easier said than done to release a secure and polished product. While companies try to work diligently to prevent vulnerabilities, they can only be partly successful with sometimes limited organizational capability by their respective internal teams.

That's where bug bounty programs come in.

During a recent Open Web Application Security Project (OWASP) conference, a hosted bug bounty contest found more than 80 vulnerabilities for the companies that participated. These types of contests and hosted programs are becoming more popular, taking place at other major computer and technology conferences across the United States.

Once discovered by third-party coders, companies move rapidly to analyze reports and fix legitimate vulnerabilities before they can be exploited.

Risk Management: Put Paranoia In Its Place

2015-29-January-Paranoia.jpg

One of my favorite songs is "Destroyer" from The Kinks. It's one of the first songs I remember from my early radio days and it fit my mindset at that time.

There's a red, under my bed
And there's a little green man in my head
And he said, 'you're not goin' crazy, you're just a bit sad
'Cause there's a man in ya, gnawin' ya, tearin' ya into two'

Silly boy ya' self-destroyer
Paranoia, the destroyer

Every second or third project that I'm on, I hear that song in my head. It starts when a client is describing a process that includes decades of checks and cross-checks that have been added over time. Each requirement probably has an interesting story behind it, but the stories are lost.

Gartner Names 6 Leaders in Resurgent Information Archiving Space

The financial crisis that started in 2008 changed many things. Financial companies closed down. CEOs lost their jobs. IT changed, too. Over the past few years data governance preservation has become a critical enterprise need. And Enterprise Information Archiving (EIA) is making a reappearance as a key technology to meet that need.

According to Gartner’s Magic Quadrant for EIA (registration required), technologies in this space are getting a second life as businesses turn to them to underpin enterprise strategies for compliance, information governance, e-discovery and the historical preservation of data.

EIA has been around for a long time -- Gartner estimates almost 20 years -- but with the economic crisis came increasingly complicated compliance requirements, resulting in enterprises searching for technology to help manage these complexities.

Customers Aren't Worried About Data Breaches [Infographic]

2014-20-November-yawn.jpgHere's good news for every company that's careless with personally identifiable information: Your customers apparently don't care.

A new study by global IT association ISACA shows that consumers haven’t changed their shopping behaviors despite a year of retail data breaches — worrisome, the organization maintains, especially with the shopaholic trifecta of Thanksgiving Day, Black Friday and Cyber Monday is just a week away.

It's not that consumers are unaware of the problem. According to the 2014 ISACA IT Risk/Reward Barometer, almost all US consumers (94 percent) have read or heard about major retailer data breaches in the past year. But while three-fourths of those surveyed claim those data breaches have increased their concerns about their personal data privacy, few are doing anything about it.

When Your Organization's Reputation is at Risk

An organization’s reputation is critical to their success (in almost every case). A smart CEO and her board pay attention to the organization’s reputation and take care to nurture, protect and grow it.

A new survey by Deloitte reinforces that obvious truth and states one other truth that should be obvious to us all: “reputation risk is driven by other business risks.”

Displaying 1-15 of 120 results

< Previous 1 2 3 4 5 6 7 8 Next >