HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Risk Management News & Analysis

Fed Cybersecurity Summit: Assessing Risks, Looking for Solutions

Here’s something to think about the next time your team crafts an email marketing message. "About two thirds of cyber attacks start with an email," said Patrick Peterson, founder and CEO of San Mateo, Calif.-based Agari, a security solutions provider.  

Email is the foundation of digital, added Agari CMO Kevin Cochrane. "And the more we go digital, the more we put ourselves at risk. I think people are just realizing. It's a problem that needs fixing — now," Cochrane said.

In a conversation with CMSWire today from the first ever White House Summit on Cybersecurity and Consumer Protection on the Stanford University campus, Peterson and Cochrane said it was time to acknowledge the potential risks of the Digital Age.

While Peterson cautioned that there was no reason to panic about the growing threats of cybercrime, he stressed that it was time to face facts, accept reality and "be mindful" about potential dangers.

"In a digital, connected world full of stronger and stronger adversaries, the risks are extreme," he said. One of the biggest risks, he added, is a collective loss of trust in the digital economy.

Better Safe than Sorry: Protecting Online Identity

Anyone who's made a purchase -- whether in-store or online -- within the last few years knows that providing an email address has become a standard part of doing business in the United States.

Plan for Migration Success with Search

2015-11-February-Home-Moving.jpg

Migrating a website or an intranet to a new CMS or new information architecture comes with considerable challenges. Automated tools can support the process, but almost inevitably a great deal of discussion and work will need to take place around specific areas of the site. Having information management policies and strategies in place goes a long way in helping to define content quality, metadata and a taxonomy for the new site. Moving file shares and other repositories into a cloud storage and application environment such as Google Drive has emerged as another requirement.

Effective search will play a vital role in adoption if the migration results in any changes to the intranet structure, and will continue to do so until users have found their way around the information architecture (IA), new content types and repositories.

The 2 Irresistible Forces of Enterprise Mobility

2015-5-february-blue-angel1.jpg

“What happens when an irresistible force meets an immovable object?” I was a teenager when I first heard this question. It was an interesting thought exercise at the time, but the practical application in business is more about two forces that go in different directions. For an example, look no farther than when an IT leader sees things differently than a business leader.

Embrace and Embody Risk Management

If a CEO wants his organization to realize the opportunity presented by risk management to deliver better decisions and, through them, improved performance, he needs to do more than “walk the talk.”

I have come up with the phrase “embrace and embody” risk management. (Feel free to borrow it.)

Bug Bounty Programs Help Companies Track Vulnerabilities

2015-3-february-giant-ant-from-WB-movie-them.jpg

Companies release new software and products to corporate users and consumers, hoping final product releases are stable and free of bugs.

But it's much easier said than done to release a secure and polished product. While companies try to work diligently to prevent vulnerabilities, they can only be partly successful with sometimes limited organizational capability by their respective internal teams.

That's where bug bounty programs come in.

During a recent Open Web Application Security Project (OWASP) conference, a hosted bug bounty contest found more than 80 vulnerabilities for the companies that participated. These types of contests and hosted programs are becoming more popular, taking place at other major computer and technology conferences across the United States.

Once discovered by third-party coders, companies move rapidly to analyze reports and fix legitimate vulnerabilities before they can be exploited.

Risk Management: Put Paranoia In Its Place

2015-29-January-Paranoia.jpg

One of my favorite songs is "Destroyer" from The Kinks. It's one of the first songs I remember from my early radio days and it fit my mindset at that time.

There's a red, under my bed
And there's a little green man in my head
And he said, 'you're not goin' crazy, you're just a bit sad
'Cause there's a man in ya, gnawin' ya, tearin' ya into two'

Silly boy ya' self-destroyer
Paranoia, the destroyer

Every second or third project that I'm on, I hear that song in my head. It starts when a client is describing a process that includes decades of checks and cross-checks that have been added over time. Each requirement probably has an interesting story behind it, but the stories are lost.

Gartner Names 6 Leaders in Resurgent Information Archiving Space

The financial crisis that started in 2008 changed many things. Financial companies closed down. CEOs lost their jobs. IT changed, too. Over the past few years data governance preservation has become a critical enterprise need. And Enterprise Information Archiving (EIA) is making a reappearance as a key technology to meet that need.

According to Gartner’s Magic Quadrant for EIA (registration required), technologies in this space are getting a second life as businesses turn to them to underpin enterprise strategies for compliance, information governance, e-discovery and the historical preservation of data.

EIA has been around for a long time -- Gartner estimates almost 20 years -- but with the economic crisis came increasingly complicated compliance requirements, resulting in enterprises searching for technology to help manage these complexities.

Customers Aren't Worried About Data Breaches [Infographic]

2014-20-November-yawn.jpgHere's good news for every company that's careless with personally identifiable information: Your customers apparently don't care.

A new study by global IT association ISACA shows that consumers haven’t changed their shopping behaviors despite a year of retail data breaches — worrisome, the organization maintains, especially with the shopaholic trifecta of Thanksgiving Day, Black Friday and Cyber Monday is just a week away.

It's not that consumers are unaware of the problem. According to the 2014 ISACA IT Risk/Reward Barometer, almost all US consumers (94 percent) have read or heard about major retailer data breaches in the past year. But while three-fourths of those surveyed claim those data breaches have increased their concerns about their personal data privacy, few are doing anything about it.

When Your Organization's Reputation is at Risk

An organization’s reputation is critical to their success (in almost every case). A smart CEO and her board pay attention to the organization’s reputation and take care to nurture, protect and grow it.

A new survey by Deloitte reinforces that obvious truth and states one other truth that should be obvious to us all: “reputation risk is driven by other business risks.”

Why Risk Management Technology Projects Fail

Too many organizations buy risk management solutions for today, without thinking of their needs for the future.

Michael Rasmussen works with a number of companies that sell solutions for risk management (these days typically packaged with other “stuff” and mislabeled GRC solutions) and helps buyers of those solutions, as well as participating in related conferences and seminars.

And though he has never run a risk management function, his views merit attention.

Quantifying the Value of Your Data

Whether it’s the amount of risk in a particular decision or the reason for a problem that impacts the bottom line, the unknown is a scary concept. As businesses continue to generate vast amounts of data, the business value of this information is palpable. However, determining whether or not this data has any economic value is difficult. Armed with advanced tools that produce incredibly huge amounts of data, storage, retrieval and analysis, businesses have taken on a new method to minimize this unknown.

Lost Your Phone? You're Probably a Guy [Infographic]

2014-25-September-battle-of-the-sexes.jpgIn the spirit of everything politically incorrect, let's talk about the superiority of women over men. OK, that's a stretch.

Let's talk about the documented, somewhat scientific finding that men can be much more irresponsible than women when it comes to losing their electronic devices.

That's the conclusion from TeamViewer, a provider of remote control and online meetings software. The company just announced the findings of its airbackup Employee Behavioral Study, which examined the behavior and attitudes of American office workers and how they affect on-the-job data loss.

Based on a sponsored Harris Poll of more than 2,000 American adults last month, men just can't keep their phones in their pockets.

Nearly half of employed men (46 percent) admit to being likely to lose the electronic device they use for work and all the important company files on it, compared to only 27 percent of employed women. And young men are the worst — with a whopping 60 percent of men ages 18 to 34 years-old owning up to likely device loss, compared to 30 percent of women in the same age group.

The Key to Security is Subtlety

2014-23-September-Megaphone.jpgPeople are similar when you dig deep: they want to get thing done and move on to the next thing. Even procrastinators get great work done when faced with having to get an even larger task accomplished.

Most people also share a degree of stubbornness. People are happy to do things your way if they see the benefit, but anything that's perceived as getting in the way is quickly worked around. When you try and force something, they will dig in their feet on sheer principle. It's amazing how hard people will work around things that they view as unnecessary change.

For organizations rolling out new systems, this is a problem.

Hoarders Anonymous for Unstructured Data

2014-19-September-Pez-Collection.jpgDo you have a storage area where you keep items you rarely or never use? Do you periodically sort out your stuff, or do you keep collecting items of debatable value? It’s human nature to hold onto things we never use for extended periods of time -- it's like the junk drawer everybody has somewhere in their house that holds a collection of random items we think are important, but we usually use the same few items every time we open the drawer.

It’s called a “JUNK drawer” for a reason -- because it’s mostly junk, and most of it should be tossed in the trash. So why do we keep these items of questionable value or use?

Displaying 1-15 of 115 results

< Previous 1 2 3 4 5 6 7 8 Next >