Articles

Tag: risk management (page 5)

  • You Can Bring Down a Website for $38

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (DDoS) assaults continue to be expensive nuisances for online businesses — and that the attacks can

    Continue reading...


  • Why Information Governance Matters for Data Protection

    Why Information Governance Matters for Data Protection

    Any outage or lost document in a business critical application is going to be costly. The average cost of datacenter downtime is around $300,000 per hour, so having at least a modest data protection plan in place moves from a nice-to-have to a must-have.

    Continue reading...


  • 10 Ways to Secure Office 365

    10 Ways to Secure Office 365

    Security. If there's one thing that concerns organizations contemplating a move of their data to the cloud, or that are already there, it's security. With new threats being introduced on a regular basis, organizations need to use all the tools they have at their disposal to secure their data.

    Continue reading...


  • What's New with Office 365 Compliance Center

    What's New with Office 365 Compliance Center

    Litigation is costly, time consuming and a headache -- and chances are your company is involved in it in some way. Compliance is the topic that causes many IT leaders to lose sleep, as they wonder whether they will survive a call from legal. Microsoft is listening.

    Continue reading...


  • 5 Steps to a Better Board

     The latest edition of McKinsey Quarterly is titled “Changing the nature of board engagement.” In this short piece, the authors, Bill Huyett and Rodney Zemmel, write that, in the face of growing business complexity and ever more rigorous regulation: McKinsey research suggests that the most effective directors are meeting

    Continue reading...


  • The Surprising Scarcity of IT Security Talent

    The Surprising Scarcity of IT Security Talent

    No, it is not your imagination: good IT security help is hard to find. So says a new survey by ISACA and RSA Conference, which reports that 82 percent of organizations expect to be attacked in 2015 – yet acknowledge that they have talent pool that is largely unqualified and

    Continue reading...


  • Ex-Ektron Pres Tim McKinnon Now Sonian CEO

    Tim McKinnon — the man who steered Ektron through its merger with EPiServer before leaving the company himself — started a new job this week. And he said he couldn't be more excited about the opportunity to take the helm of a small but growing company.

    Continue reading...


  • Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Where does an 800 pound gorilla sit? Anywhere it wants. And in the case of Lexmark, it wants to sit in the enterprise software space.

    Continue reading...


  • We're All In This Together: Share Your Cybercrime Stories

    We're All In This Together: Share Your Cybercrime Stories

    What's the best defense against cybercrime? Surprisingly, it might be a big mouth. Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.

    Continue reading...


  • The Continued Failure of Risk Management Practices

    Risk management is not about avoiding failure -- it is about achieving success. The ERM Initiative at North Carolina State University, led by Mark Beasley, has published its sixth report on the state of risk management. I saw the first report in 2010 and frankly, not much has changed.

    Continue reading...


  • 10 Years in Cyberspace Security

    10 Years in Cyberspace Security

    Ten years ago, I wrote a paper on the future of cyberspace. In it, I pointed to three areas that we needed to address to make cyberspace safe for information sharing: establishing strong cyber-trust, enabling secure mobility and striking a balance between security and privacy rights.

    Continue reading...


  • Fed Cybersecurity Summit: Assessing Risks, Looking for Solutions

    Here’s something to think about the next time your team crafts an email marketing message. "About two thirds of cyber attacks start with an email," said Patrick Peterson, founder and CEO of San Mateo, Calif.-based Agari, a security solutions provider.

    Continue reading...


  • Better Safe than Sorry: Protecting Online Identity

    Anyone who's made a purchase -- whether in-store or online -- within the last few years knows that providing an email address has become a standard part of doing business in the United States. Questions for Consumers With Data Privacy Day  not too far behind us, consumers should consider asking

    Continue reading...


  • Plan for Migration Success with Search

    Plan for Migration Success with Search

    Migrating a website or an intranet to a new CMS or new information architecture comes with considerable challenges. Automated tools can support the process, but almost inevitably a great deal of discussion and work will need to take place around specific areas of the site.

    Continue reading...


Displaying 57-70 of 182