Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
Search Results: risk management (689)
Most companies still struggle with managing credit manually. Keeping track of customers, payment terms, ratings and more in a mix…
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.
Data loss prevention policies sound good on the surface, but dig deeper and you’ll find that they come with unexpected risks. Analyst Robert Wood explains what these risks are and how to avoid them.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
Automated risk management is growing in importance as global finance becomes more interconnected and mobile — and therefore more complex.
When it comes to cyber risk quantification, cybersecurity as an industry has become abysmal. How can organizations overcome these challenges?
Vulnerability management is always a daunting task. In multi-cloud scenario, it’s even more challenging, as Chris Hughes explains in the context of AppSec.
In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.
When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.
Using NLP and other artificial intelligence technology, the tech startup helps make disparate elements of supply chains run more smoothly.
The steady pace of software updates have become part of the rhythm of life in the 21st Century. Even on…
In this Acceleration Economy roundtable, analysts Aaron Back, Wayne Sadin, and Kenny Mullican discuss the practical applications of AP automation to streamline supply chain processes.
Is your organization equipped to handle the loss of a key IT team member? Will certain critical functions within the…
As technological systems become more complex through Cloud, microservices, IoT, and more, the need for sound vulnerability management is even more paramount.
While secrets management has been a challenge, it’s critical that organizations have a game plan for when a credential leak occurs.
As the future is certainly digital, organizations need to ensure they are able to manage digital risk and growth.