Tag: risk management (page 9)

  • Reviewing the State of GRC

    If there is any value to the concept of Governance, Risk management and Compliance, it must lie in more than the generic meanings of its constituent parts. A good place to start is the treatment of the term by the Open Compliance & Ethics Group (OCEG ).

    Continue reading...

  • Oh No Said the Girl

    6 Ways to Cope With a Scary Social World

    On a daily basis, 30,000 websites are hacked, 75 million scams are sent via email and 41,000 identities are stolen.  Since its infancy, the web has been a gold mine for scammers who have continued to adapt to the ever-evolving landscape.

    Continue reading...

  • Modern life

    Menlo Security Claims It Can Isolate Your Malware

    Isolation has always been seen as the ultimate defense against a malware attack— whether it's the simple act of turning off your Internet connection to keep malware from sending out purloined data to more sophisticated virtualization use cases.

    Continue reading...

  • It's a cat-astrophe

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (DDoS) assaults continue to be expensive nuisances for online businesses — and that the attacks can

    Continue reading...

  • Playing Jenga

    Why Information Governance Matters for Data Protection

    Any outage or lost document in a business critical application is going to be costly. The average cost of datacenter downtime is around $300,000 per hour, so having at least a modest data protection plan in place moves from a nice-to-have to a must-have.

    Continue reading...

  • 10 Ways to Secure Office 365

    10 Ways to Secure Office 365

    Security. If there's one thing that concerns organizations contemplating a move of their data to the cloud, or that are already there, it's security. With new threats being introduced on a regular basis, organizations need to use all the tools they have at their disposal to secure their data.

    Continue reading...

  • Whats New with Office 365 Compliance Center

    What's New with Office 365 Compliance Center

    Litigation is costly, time consuming and a headache -- and chances are your company is involved in it in some way. Compliance is the topic that causes many IT leaders to lose sleep, as they wonder whether they will survive a call from legal. Microsoft is listening.

    Continue reading...

  • 5 Steps to a Better Board

     The latest edition of McKinsey Quarterly is titled “Changing the nature of board engagement.” In this short piece, the authors, Bill Huyett and Rodney Zemmel, write that, in the face of growing business complexity and ever more rigorous regulation: McKinsey research suggests that the most effective directors are meeting

    Continue reading...

  • The Surprising Scarcity of IT Security Talent

    The Surprising Scarcity of IT Security Talent

    No, it is not your imagination: good IT security help is hard to find. So says a new survey by ISACA and RSA Conference, which reports that 82 percent of organizations expect to be attacked in 2015 – yet acknowledge that they have talent pool that is largely unqualified and

    Continue reading...

  • Ex-Ektron Pres Tim McKinnon Now Sonian CEO

    Tim McKinnon — the man who steered Ektron through its merger with EPiServer before leaving the company himself — started a new job this week. And he said he couldn't be more excited about the opportunity to take the helm of a small but growing company.

    Continue reading...

  • Does Lexmark Have What it Takes to Be an 800 Pound Gorilla

    Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

    Where does an 800 pound gorilla sit? Anywhere it wants. And in the case of Lexmark, it wants to sit in the enterprise software space.

    Continue reading...

  • Were All In This Together Share Your Cybercrime Stories

    We're All In This Together: Share Your Cybercrime Stories

    What's the best defense against cybercrime? Surprisingly, it might be a big mouth. Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.

    Continue reading...

  • The Continued Failure of Risk Management Practices

    Risk management is not about avoiding failure -- it is about achieving success. The ERM Initiative at North Carolina State University, led by Mark Beasley, has published its sixth report on the state of risk management. I saw the first report in 2010 and frankly, not much has changed.

    Continue reading...

  • 10 Years in Cyberspace Security

    10 Years in Cyberspace Security

    Ten years ago, I wrote a paper on the future of cyberspace. In it, I pointed to three areas that we needed to address to make cyberspace safe for information sharing: establishing strong cyber-trust, enabling secure mobility and striking a balance between security and privacy rights.

    Continue reading...

Displaying 113-126 of 243