Risk Management

Risk Management news, analysis, research, how-to, opinion, and video.

gas flame
0 intro best practices

1 quicker

How automated investigation can accelerate threat detection

Cyber security analysts are overwhelmed with the pressure of keeping their companies safe. Here’s what you need to consider when adopting an automated investigation environment.

May I see your comprehensive security policy please?

Lack of compliance with the HIPAA security rule is common in county and municipal covered entities (CE). I provide some essential, primary source tools and documents for HIPAA security rule compliance.

managing business process cycle rotate phases

Buying the best BPM for your needs

Business process management software can be thought of as 'the oil that lubricates corporate machinery.' With dozens of competitors on the market, use the reverse-engineering technique to find the BPM software best suited to your...

big data analytics research chart growth [Thinkstock-516976188] [HOLD - CW August 2016]

Big data analytics and NLP: How health plans can make more money -- and keep it

Natural language processing (NLP) is an emerging area that can help unlock value from the vast stores of unstructured data that account for as much as 80% of all clinical data. UPMC Health Plan does just that.

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

whack a mole security threat

Malware strategy: Prevent, Contain, Recover

Your environment is only as strong as its weakest link. You are going to be attacked, and someone will eventually succeed in getting through your defenses.

traffic jam

The art of maximizing work not done

How should your technology organization decrease wasteful work? Following lean and agile principles will guide the way. Increase flow and decrease variability using Donald Reinertsen's techniques.

blindfolded

8 reasons why your security awareness program sucks

I have come to the conclusion that most awareness programs are just very bad, and that like all security countermeasures, there will be an inevitable failing.

privacy policy

Privacy policy or privacy notice: what's the difference?

Is there a difference between a privacy policy and a privacy notice? Some of the confusion comes from a company’s description of their privacy practices on their website being called a privacy policy. Some people ask, “Isn’t the...

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

risk reward ts

CIOs: Match security plans to your company's 'risk appetite'

CIOs discuss their risk-management strategies for dealing with cybersecurity threats and the aftermath of a data breach.

w2 phishing

Report says criminals are better communicators than IT staffers

Humans remain the largest security risk, a new Verizon report says.

lawgeex legal machine learning crowdsourcing

No lawyer? This online tool uses AI to review your contracts

Business documents written in foreign languages are no longer the problem they once were thanks to technologies like Google Translate, but what about contracts written in legalese?

gallery toystory 03jpg 2abbab4f

What companies need to know when considering automation

Successful lessons for organizations considering automation 'to infinity and beyond'.

danger sign 100588162

Triple Threat to IT Success™

There are 3 key reasons that cause an IT organization to fail. Learn about this "Triple Threat to IT Success™" to prevent each threat in your company and achieve more success.

Paris gargoyles

Corporate file systems have 'staggering level of exposure'

A year of anonymous data from risk assessments of corporate file systems reveals that many companies are failing to use permissions to limit access to sensitive data.

intro hp title

9 biggest information security threats through 2018

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

padlock and chain, security

Mizuho Bank speeds international securities transactions using blockchain

Japan's Mizuho Bank is considering using blockchain technology to speed the cross-border transfer of financial instruments.

Load More