risk management - News, Features, and Slideshows


  • Spy-proof enterprise encryption is possible, but daunting

    Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.

  • Top 5 things to do before buying more security technology

    Las Vegas --Throwing more technology at <a href="http://www.networkworld.com/topics/security.html">security</a> threats as they crop up is not the best way to go if the goal is to protect the most valuable data at the <a href="http://www.networkworld.com/columnists/2011/050211-andreas.html">best price</a>, attendees at <a href="http://www.networkworld.com/keywords/interop.html">Interop</a> were told this week.

  • Enterprise risk management: all systems go

    Understanding that security is mission-critical has led the Georgetown University Safety and Information Services departments to work together in unprecedented ways.

  • Tough times call for good risk management

    These are tough times. Over the last decade you have most likely become used to some kind of more-or-less stable basis for how your business operates. Sorry, but that's all about to change because the economy is in serious trouble.

  • Regulatory compliance provides no edge say local CIOs

    A new survey of CIOs reveals most New Zealand companies believe they will not gain an advantage over their rivals by meeting regulatory compliance standards. The finding is in marked contrast to a similar survey of CIOs in the Asia Pacific region, 69% of whom believe they will gain an advantage.

  • Taking the uncertainty out of risk management

    Developing an enterprise risk management strategy is an enormous undertaking. Despite the wealth of best-practices frameworks out there, serious planning and communication across silos are always required to create policies and processes that work for an individual organisation. Here are some tips from security and risk professionals on how to go about it.