IP network

Risk management News

  • May 24, 2016 24 May'16

    Lieu, Hurd school House colleagues on cyberhygiene, defense

    Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.

  • March 22, 2016 22 Mar'16

    Managing Internet of Things risks

    This week, bloggers explore management for Internet of Things risks, layered protocol stacks and TELoIP's SD-WAN offering.

  • February 16, 2016 16 Feb'16

    Beyond BYOD: How IoT and new tech are changing modern GRC

    Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the hype, but companies have been reaping IoT's data analysis benefits to streamline processes and provide increased value to customers. Connected devices raise numerous data management questions, however. As more devices are connected, it will create an unprecedented flow of data that comes with an unprecedented amount of vulnerabilities. To capitalize on IoT's business benefits, companies will have to make big adjustments to GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data governance, security and compliance processes, and strategies to take full business advantage of IoT data management.

  • December 11, 2015 11 Dec'15

    Juniper decouples SDN switch from Junos operating system

    This week, software-defined networking bloggers explore Juniper's decoupled QFX5200 switch, the basics of VXLAN and how Cisco's APIC-EM system lets users ease into SDN.

View All News

Risk management Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Risk management

Learn to apply best practices and optimize your operations.

  • For HIPAA-compliant cloud storage, weigh risks and set recovery steps

    Healthcare organizations and the cloud storage providers they work with must conduct risk assessments to confirm that all parties are safeguarding patient data as part of HIPAA-compliant cloud storage.

    Cloud companies that handle protected health information on behalf of providers are required to sign business associate agreements, some aspects of which are now subject to HIPAA audits by the federal government.

    This handbook looks at cloud storage and backup technology and its relationship to HIPAA compliance. Over the three chapters in this guide, our contributing writers look at how providers, business associates and covered entities are preparing for HIPAA audits; how health systems use the cloud for backup storage purposes and disaster recovery efforts; and how moving more healthcare data into the cloud has changed other aspects of providers' businesses.

     Continue Reading

  • Major password breaches: How can enterprises manage user risk?

    With the large number of password breaches happening, enterprises should look into new methods of protecting their resources. Expert Nick Lewis explains how to reduce user risk. Continue Reading

  • Machine learning platform minimized Brexit fallout for investors

    The Brexit vote caused an enormous shock to the world's financial systems and cost investors a lot of money. But a data-driven strategy and machine learning tools helped some avoid the risks. Continue Reading

View All Manage

Problem Solve Risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve