Risk management News
December 11, 2015
This week, software-defined networking bloggers explore Juniper's decoupled QFX5200 switch, the basics of VXLAN and how Cisco's APIC-EM system lets users ease into SDN.
December 02, 2015
As organizations' data threats and regulatory demands increase, GRC professionals are seeing their skill sets become highly prized across industries.
August 21, 2015
The record-keeping systems used by most healthcare providers don't make analyzing the data easy, but some providers are finding a way around these challenges.
July 28, 2015
Cattle, grain, shells, metal coins, paper bills, plastic cards. Don't see a pattern? Look again: All of them were or are forms of payment, and all of them are mobile. Mobile device technology-enabled payments are simply the latest, natural development in this progression toward greater convenience, writes CIO expert Harvey Koeppel. He urges CIOs to keep four features top of mind as you strive to expand the scale and acceptance of new mobile payment methods: utility, reliability, trust and convenience.
In this SearchCIO handbook, get Koeppel's tips for CIOs and IT leaders on how to ensure that mobile payments are convenient and secure for users. In our second piece, find out why mobile expert Bryan Barringer says he'll take mobile wallets over paper money or credit cards any day. And lastly, from technology writer Mary K. Pratt, learn why CIOs still need to deal with security risks when it comes to mobile payment methods.
Risk management Get Started
Bring yourself up to speed with our introductory content
CISOs regularly have to present a security assessment report to the board of directors. Expert Mike O. Villegas has some tips to make it more engaging. Continue Reading
One neurosurgeon in upstate New York is working to reduce the risk of complex surgical procedures by using a 3D printer. In doing so, he is also seeing lower costs for surgery. Continue Reading
Third-party contractors and business partners can create risks for enterprises. Expert Eric Cole offers guidance on improving supply chain security and controlling third-party risks. Continue Reading
Evaluate Risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When building a cloud governance model, account not only for technical risks, such as a data center failure, but business risks, such as vendor lock-in, as well. Continue Reading
To be able to call your new firewall 'next generation,' it must have certain advanced firewall capabilities. Learn what these are in this technical tip. Continue Reading
Find out how to mitigate the risks associated with fake Android apps, like the BeNews app used by the Hacking Team, that trick the Google Play Store. Continue Reading
Manage Risk management
Learn to apply best practices and optimize your operations.
As software-defined networking continues to gain traction, it's important that security keeps pace. Expert John Burke explains the role of the SOC in a software-defined network. Continue Reading
Determining where cloud data is stored and what the legal, enterprise and regulatory requirements are can be a challenge. Expert Ed Moyle explains how to understand cloud data residency. Continue Reading
SOA and the cloud are not the answers to everything. We examine the steps organizations need to take in order to solve problems surrounding business data retention. Continue Reading
Problem Solve Risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The cyberthreat landscape grows more dangerous by the day. Harvey Koeppel offers a 12-point cybersecurity checklist for CIOs. Continue Reading
Information security metrics may be lost on some executives, Curran says. Keep their attention on security measures with the right portfolio. Continue Reading
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading