Articles

Tag: risk management (page 6)

  • Reviewing the State of GRC

    If there is any value to the concept of Governance, Risk management and Compliance, it must lie in more than the generic meanings of its constituent parts. A good place to start is the treatment of th

    Continue reading...


  • 6 Ways to Cope With a Scary Social World

    6 Ways to Cope With a Scary Social World

    On a daily basis, 30,000 websites are hacked, 75 million scams are sent via email and 41,000 identities are stolen.  Since its infancy, the web has been a gold mine for scammers who have continue

    Continue reading...


  • Menlo Security Claims It Can Isolate Your Malware

    Menlo Security Claims It Can Isolate Your Malware

    Isolation has always been seen as the ultimate defense against a malware attack— whether it's the simple act of turning off your Internet connection to keep malware from sending out purloined data to

    Continue reading...


  • You Can Bring Down a Website for $38

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (D

    Continue reading...


  • Why Information Governance Matters for Data Protection

    Why Information Governance Matters for Data Protection

    Any outage or lost document in a business critical application is going to be costly. The average cost of datacenter downtime is around $300,000 per hour, so having at least a modest data protection p

    Continue reading...


  • 10 Ways to Secure Office 365

    10 Ways to Secure Office 365

    Security. If there's one thing that concerns organizations contemplating a move of their data to the cloud, or that are already there, it's security. With new threats being introduced on a regular bas

    Continue reading...


  • What's New with Office 365 Compliance Center

    What's New with Office 365 Compliance Center

    Litigation is costly, time consuming and a headache -- and chances are your company is involved in it in some way. Compliance is the topic that causes many IT leaders to lose sleep, as they wonder whe

    Continue reading...


  • 5 Steps to a Better Board

     The latest edition of McKinsey Quarterly is titled “Changing the nature of board engagement.” In this short piece, the authors, Bill Huyett and Rodney Zemmel, write that, in the

    Continue reading...


  • The Surprising Scarcity of IT Security Talent

    The Surprising Scarcity of IT Security Talent

    No, it is not your imagination: good IT security help is hard to find. So says a new survey by ISACA and RSA Conference, which reports that 82 percent of organizations expect to be attacked in 2015 &n

    Continue reading...


  • Ex-Ektron Pres Tim McKinnon Now Sonian CEO

    Tim McKinnon — the man who steered Ektron through its merger with EPiServer before leaving the company himself — started a new job this week. And he said he couldn't be more excited about

    Continue reading...


  • Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Where does an 800 pound gorilla sit?Anywhere it wants.And in the case of Lexmark, it wants to sit in the enterprise software space.Brian Anderson, Chief Technology Officer for enterprise software at L

    Continue reading...


  • We're All In This Together: Share Your Cybercrime Stories

    We're All In This Together: Share Your Cybercrime Stories

    What's the best defense against cybercrime? Surprisingly, it might be a big mouth. Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense.

    Continue reading...


  • The Continued Failure of Risk Management Practices

    Risk management is not about avoiding failure -- it is about achieving success.The ERM Initiative at North Carolina State University, led by Mark Beasley, has published its sixth report on the st

    Continue reading...


  • 10 Years in Cyberspace Security

    10 Years in Cyberspace Security

    Ten years ago, I wrote a paper on the future of cyberspace. In it, I pointed to three areas that we needed to address to make cyberspace safe for information sharing: establishing strong cyber-trust,

    Continue reading...


Displaying 71-84 of 199