Risk management News
November 24, 2016
Freely available company information may seem a challenge to monetise. However companies like Dun & Bradstreet (D&B), Experian, Bureau van Dijk, Graydon, Equifax and Creditsafe have been ...
May 24, 2016
Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.
March 22, 2016
This week, bloggers explore management for Internet of Things risks, layered protocol stacks and TELoIP's SD-WAN offering.
February 16, 2016
Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the hype, but companies have been reaping IoT's data analysis benefits to streamline processes and provide increased value to customers. Connected devices raise numerous data management questions, however. As more devices are connected, it will create an unprecedented flow of data that comes with an unprecedented amount of vulnerabilities. To capitalize on IoT's business benefits, companies will have to make big adjustments to GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data governance, security and compliance processes, and strategies to take full business advantage of IoT data management.
Risk management Get Started
Bring yourself up to speed with our introductory content
If you think Payment Card Industry Data Security Standard is just for merchants, think again. Here's why virtually every company can boost security and address risk issues using PCI DSS. Continue Reading
A McKesson Corporation population health expert explains advanced cost accounting techniques for value-based care, alternative payment models and revenue optimization. Continue Reading
Many laud NLP in healthcare for its ability to take unstructured data, and make it valuable. Two health IT experts discuss NLP's role in achieving population health. Continue Reading
Evaluate Risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Microsoft Office 365 SAML flaw that allowed attackers to bypass authentication was resolved quickly, but offers enterprises some important lessons. Expert Ed Moyle discusses. Continue Reading
The Rowhammer and memory deduplication attack enables read and write access to Microsoft Edge browsers. Expert Nick Lewis explains how to mitigate this threat. Continue Reading
Blockchain's distributed ledger could someday be a useful tool for financial transactions and risk management. Experts say it's not too early for CFOs to get familiar with the basics. Continue Reading
Manage Risk management
Learn to apply best practices and optimize your operations.
With the help of risk adjustment coding tech, which utilizes natural language processing and big data, UPMC Health Plan was able to capture $62.2 million in additional revenue. Continue Reading
Healthcare organizations and the cloud storage providers they work with must conduct risk assessments to confirm that all parties are safeguarding patient data as part of HIPAA-compliant cloud storage.
Cloud companies that handle protected health information on behalf of providers are required to sign business associate agreements, some aspects of which are now subject to HIPAA audits by the federal government.
This handbook looks at cloud storage and backup technology and its relationship to HIPAA compliance. Over the three chapters in this guide, our contributing writers look at how providers, business associates and covered entities are preparing for HIPAA audits; how health systems use the cloud for backup storage purposes and disaster recovery efforts; and how moving more healthcare data into the cloud has changed other aspects of providers' businesses.Continue Reading
With the large number of password breaches happening, enterprises should look into new methods of protecting their resources. Expert Nick Lewis explains how to reduce user risk. Continue Reading
Problem Solve Risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With today's cyberthreats, the CISO has to know more about intelligence, working with government and private industry, and how to tailor the security program to further the business. Continue Reading
For organizations concerned about blade server lock-in, virtualization and cloud offer compelling alternatives with similar benefits, such as consolidation in the data center. Continue Reading
The Brexit vote caused an enormous shock to the world's financial systems and cost investors a lot of money. But a data-driven strategy and machine learning tools helped some avoid the risks. Continue Reading