Risk management

Risk management News

  • August 21, 2015 21 Aug'15

    Providers find routes to healthcare data analytics

    The record-keeping systems used by most healthcare providers don't make analyzing the data easy, but some providers are finding a way around these challenges.

  • July 28, 2015 28 Jul'15

    Mobile payment methods come of age

    Cattle, grain, shells, metal coins, paper bills, plastic cards. Don't see a pattern? Look again: All of them were or are forms of payment, and all of them are mobile. Mobile device technology-enabled payments are simply the latest, natural development in this progression toward greater convenience, writes CIO expert Harvey Koeppel. He urges CIOs to keep four features top of mind as you strive to expand the scale and acceptance of new mobile payment methods: utility, reliability, trust and convenience.

    In this SearchCIO handbook, get Koeppel's tips for CIOs and IT leaders on how to ensure that mobile payments are convenient and secure for users. In our second piece, find out why mobile expert Bryan Barringer says he'll take mobile wallets over paper money or credit cards any day. And lastly, from technology writer Mary K. Pratt, learn why CIOs still need to deal with security risks when it comes to mobile payment methods.

  • July 14, 2015 14 Jul'15

    Windows Server 2003 end of life leaves many at risk

    The Windows Server 2003 end of life is upon us and many organizations still haven't made the upgrades or security remediations necessary to mitigate the coming risks.

  • July 08, 2015 08 Jul'15

    Mobile payment systems can boost data security, but are not risk free

    Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown.

View All News

Risk management Get Started

Bring yourself up to speed with our introductory content

  • Improve your disaster recovery project management

    Effective project management in business continuity and disaster recovery requires proper plans, establishing goals and deliverables, and setting a schedule. Continue Reading

  • Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or external, or whether or not they are controllable by the organization. See our guide to types of enterprise risk. Continue Reading

  • Weigh the benefits, risks of going mobile in the enterprise

    Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise. Continue Reading

View All Get Started

Evaluate Risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Risk management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • In denial about DDoS: Defense planning falls short

    Advanced distributed denial-of-service attackers are using a mix of techniques to hit targeted victims in ways all too similar to advanced persistent threats. DDoS defense planning is still lax at many enterprises, but if you do not have mitigation processes in place, it will cost you. Response, brand reputation and opportunity costs quickly add up in major attacks. The primary cost for victims, tied to the length of the outage, is revenue interruption says John Pescatore, director of emerging trends at the SANS Institute. The former Gartner analyst looks at the current denial-of-service landscape and associated costs in his article, “DDoS defense planning falls short.” Adam Rice and James Ringold continue their series on APTs. In their article “Man versus machine data,” the authors outline strategies to implement verbose logging across the enterprise and discuss the promise of big data security analytics to help security professionals track the APT lifecycle. The hard issues around intellectual property protection and the steps enterprises and vendors are taking to address them are also covered this month in Feature Editor Kathleen Richards’ article, “Breaches reignite intellectual property protection.” We also welcome back longtime columnist Marcus Ranum, who starts off the year chatting about metrics with IBM’s Diana Kelley. Security 7 winner Frederick P. Chang, Ph.D., offers his take on what is needed to take cybersecurity education and science to the next level. Continue Reading

  • Collaboration with Cloud Computing

    In this excerpt of Collaboration with Cloud Computing, author Ric Messier outlines how enterprises can evaluate risk management in the cloud. Continue Reading

  • Governance and analytics reduce big data risk, boost information value

    In this Q&A, ARMA 2014 Conference presenter Barclay T. Blair discusses how information governance strategies can help with big data risk management. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close