Articles

Tag: risk management (page 5)

  • Risk Is Not an Island

    Risk Is Not an Island

    Risk does not exist in a vacuum. Considering it as such is a sure path to poor performance. A Governance Model for Risk ... The National Association of Corporate Directors counts among its members a g

    Continue reading...


  • Let's Talk About Organizational Culture

    Organizational culture has been blamed for many recent disasters.  These include BP Deep Water Horizon — referred to as both a “culture of greed” as well as a culture that had&n

    Continue reading...


  • CMSWire's Hits of 2015: Information Management

    CMSWire's Hits of 2015: Information Management

    Documents, email, digital files … There's no end to the amount of information you have to manage throughout the day — much less through the year. We’re here to help you out, with a

    Continue reading...


  • I've Seen the Future of ECM, and It's Not ECM

    I've Seen the Future of ECM, and It's Not ECM

    The balance of power in ECM is shifting away from IT and records management and towards information security. Information security makes for a far better owner of enterprise content management (ECM) t

    Continue reading...


  • Your Compliance Advice Countdown for 2016

    Your Compliance Advice Countdown for 2016

    2015 provided a lot of food for thought when it came to data protection, with data breaches making the news almost every week. This included the United States Office of Personnel Management announceme

    Continue reading...


  • Is Information Security Asleep at the Wheel?

    Is Information Security Asleep at the Wheel?

    If people think they have effective cyber security, they are almost certainly mistaken. Sobering Numbers Let’s look at the results of Protiviti’s 2015 IT Security and Privacy Program. The

    Continue reading...


  • Smarsh Enhances Its Web Archiving Solution

    Smarsh Enhances Its Web Archiving Solution

    Portland, Ore.-based Smarsh, a provider of cloud-based archiving and compliance solutions, claims it can make it easier to track data across all of your websites. The company announced

    Continue reading...


  • Risk Decisions in a Time of Uncertainty

    Are you ready for the new technology that will change our world, again? It’s not that long since we were dismissing the Internet of Things as something very much "next generation." But, as you w

    Continue reading...


  • The Greatest Cyber Risk Of All

    The Greatest Cyber Risk Of All

    Cyber risk continues to be a concern for many, as witnessed in recent coverage. And it looks as if hackers are getting smarter, while businesses remain in denial. No Boundaries The Deloitte post, "Cyb

    Continue reading...


  • Reviewing the State of GRC

    If there is any value to the concept of Governance, Risk management and Compliance, it must lie in more than the generic meanings of its constituent parts. A good place to start is the treatment of th

    Continue reading...


  • 6 Ways to Cope With a Scary Social World

    6 Ways to Cope With a Scary Social World

    On a daily basis, 30,000 websites are hacked, 75 million scams are sent via email and 41,000 identities are stolen.  Since its infancy, the web has been a gold mine for scammers who have continue

    Continue reading...


  • Menlo Security Claims It Can Isolate Your Malware

    Menlo Security Claims It Can Isolate Your Malware

    Isolation has always been seen as the ultimate defense against a malware attack— whether it's the simple act of turning off your Internet connection to keep malware from sending out purloined data to

    Continue reading...


  • You Can Bring Down a Website for $38

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (D

    Continue reading...


  • Why Information Governance Matters for Data Protection

    Why Information Governance Matters for Data Protection

    Any outage or lost document in a business critical application is going to be costly. The average cost of datacenter downtime is around $300,000 per hour, so having at least a modest data protection p

    Continue reading...


Displaying 57-70 of 194