Risk management News
May 24, 2016
Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.
March 22, 2016
This week, bloggers explore management for Internet of Things risks, layered protocol stacks and TELoIP's SD-WAN offering.
February 16, 2016
Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the hype, but companies have been reaping IoT's data analysis benefits to streamline processes and provide increased value to customers. Connected devices raise numerous data management questions, however. As more devices are connected, it will create an unprecedented flow of data that comes with an unprecedented amount of vulnerabilities. To capitalize on IoT's business benefits, companies will have to make big adjustments to GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data governance, security and compliance processes, and strategies to take full business advantage of IoT data management.
December 11, 2015
This week, software-defined networking bloggers explore Juniper's decoupled QFX5200 switch, the basics of VXLAN and how Cisco's APIC-EM system lets users ease into SDN.
Risk management Get Started
Bring yourself up to speed with our introductory content
A McKesson Corporation population health expert explains advanced cost accounting techniques for value-based care, alternative payment models and revenue optimization. Continue Reading
Many laud NLP in healthcare for its ability to take unstructured data, and make it valuable. Two health IT experts discuss NLP's role in achieving population health. Continue Reading
Risk management is a company's process for identifying and controlling threats to its assets, including proprietary corporate data, customers' PII and intellectual property. Continue Reading
Evaluate Risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Microsoft Office 365 SAML flaw that allowed attackers to bypass authentication was resolved quickly, but offers enterprises some important lessons. Expert Ed Moyle discusses. Continue Reading
The Rowhammer and memory deduplication attack enables read and write access to Microsoft Edge browsers. Expert Nick Lewis explains how to mitigate this threat. Continue Reading
Blockchain's distributed ledger could someday be a useful tool for financial transactions and risk management. Experts say it's not too early for CFOs to get familiar with the basics. Continue Reading
Manage Risk management
Learn to apply best practices and optimize your operations.
Healthcare organizations and the cloud storage providers they work with must conduct risk assessments to confirm that all parties are safeguarding patient data as part of HIPAA-compliant cloud storage.
Cloud companies that handle protected health information on behalf of providers are required to sign business associate agreements, some aspects of which are now subject to HIPAA audits by the federal government.
This handbook looks at cloud storage and backup technology and its relationship to HIPAA compliance. Over the three chapters in this guide, our contributing writers look at how providers, business associates and covered entities are preparing for HIPAA audits; how health systems use the cloud for backup storage purposes and disaster recovery efforts; and how moving more healthcare data into the cloud has changed other aspects of providers' businesses.Continue Reading
With the large number of password breaches happening, enterprises should look into new methods of protecting their resources. Expert Nick Lewis explains how to reduce user risk. Continue Reading
The Brexit vote caused an enormous shock to the world's financial systems and cost investors a lot of money. But a data-driven strategy and machine learning tools helped some avoid the risks. Continue Reading
Problem Solve Risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Machine learning applications are beneficial to enterprises, but there are also several risks involved. Expert Judith Myerson explains five ways to combat them. Continue Reading
One neurosurgeon in upstate New York is working to reduce the risk of complex surgical procedures by using a 3D printer. In doing so, he is also seeing lower costs for surgery. Continue Reading
Information security metrics may be lost on some executives, Curran says. Keep their attention on security measures with the right portfolio. Continue Reading