Articles

Tag: risk management (page 5)

  • Smarsh Enhances Its Web Archiving Solution

    Smarsh Enhances Its Web Archiving Solution

    Portland, Ore.-based Smarsh, a provider of cloud-based archiving and compliance solutions, claims it can make it easier to track data across all of your websites. The company announced today that it was adding enhanced enhanced version of its cloud-based web archiving solution.

    Continue reading...


  • Risk Decisions in a Time of Uncertainty

    Are you ready for the new technology that will change our world, again? It’s not that long since we were dismissing the Internet of Things as something very much "next generation." But, as you will see from Deloitte’s collection of articles, many organizations are already starting to deploy related

    Continue reading...


  • The Greatest Cyber Risk Of All

    The Greatest Cyber Risk Of All

    Cyber risk continues to be a concern for many, as witnessed in recent coverage. And it looks as if hackers are getting smarter, while businesses remain in denial. No Boundaries The Deloitte post, "Cyber risk, issues and opportunities for private companies " is important because it asserts — correctly

    Continue reading...


  • Reviewing the State of GRC

    If there is any value to the concept of Governance, Risk management and Compliance, it must lie in more than the generic meanings of its constituent parts. A good place to start is the treatment of the term by the Open Compliance & Ethics Group (OCEG ).

    Continue reading...


  • 6 Ways to Cope With a Scary Social World

    6 Ways to Cope With a Scary Social World

    On a daily basis, 30,000 websites are hacked, 75 million scams are sent via email and 41,000 identities are stolen.  Since its infancy, the web has been a gold mine for scammers who have continued to adapt to the ever-evolving landscape.

    Continue reading...


  • Menlo Security Claims It Can Isolate Your Malware

    Menlo Security Claims It Can Isolate Your Malware

    Isolation has always been seen as the ultimate defense against a malware attack— whether it's the simple act of turning off your Internet connection to keep malware from sending out purloined data to more sophisticated virtualization use cases.

    Continue reading...


  • You Can Bring Down a Website for $38

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (DDoS) assaults continue to be expensive nuisances for online businesses — and that the attacks can

    Continue reading...


  • Why Information Governance Matters for Data Protection

    Why Information Governance Matters for Data Protection

    Any outage or lost document in a business critical application is going to be costly. The average cost of datacenter downtime is around $300,000 per hour, so having at least a modest data protection plan in place moves from a nice-to-have to a must-have.

    Continue reading...


  • 10 Ways to Secure Office 365

    10 Ways to Secure Office 365

    Security. If there's one thing that concerns organizations contemplating a move of their data to the cloud, or that are already there, it's security. With new threats being introduced on a regular basis, organizations need to use all the tools they have at their disposal to secure their data.

    Continue reading...


  • What's New with Office 365 Compliance Center

    What's New with Office 365 Compliance Center

    Litigation is costly, time consuming and a headache -- and chances are your company is involved in it in some way. Compliance is the topic that causes many IT leaders to lose sleep, as they wonder whether they will survive a call from legal. Microsoft is listening.

    Continue reading...


  • 5 Steps to a Better Board

     The latest edition of McKinsey Quarterly is titled “Changing the nature of board engagement.” In this short piece, the authors, Bill Huyett and Rodney Zemmel, write that, in the face of growing business complexity and ever more rigorous regulation: McKinsey research suggests that the most effective directors are meeting

    Continue reading...


  • The Surprising Scarcity of IT Security Talent

    The Surprising Scarcity of IT Security Talent

    No, it is not your imagination: good IT security help is hard to find. So says a new survey by ISACA and RSA Conference, which reports that 82 percent of organizations expect to be attacked in 2015 – yet acknowledge that they have talent pool that is largely unqualified and

    Continue reading...


  • Ex-Ektron Pres Tim McKinnon Now Sonian CEO

    Tim McKinnon — the man who steered Ektron through its merger with EPiServer before leaving the company himself — started a new job this week. And he said he couldn't be more excited about the opportunity to take the helm of a small but growing company.

    Continue reading...


  • Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Where does an 800 pound gorilla sit? Anywhere it wants. And in the case of Lexmark, it wants to sit in the enterprise software space.

    Continue reading...


Displaying 57-70 of 188