There’s no getting around it, I am long in the tooth and have been dealing with individuals who break trust within their work environment for more than 30 years, both in government (where we called it ...
This post is brought to you by Xerox. With Xerox driving your non-core business processes, you are free to focus on what matters most. You are ready for real business. As always, VentureBeat is ...
To continue reading this content, please enable JavaScript in your browser settings and refresh this page. The field of risk management is looking beyond the goal of ...
As organizations continually increase their dependence on information technology (IT) systems to conduct business, mitigating IT risk has become a top priority. But effectively managing IT risk is no ...
Most organizations are transitioning, or have already transitioned, to a risk-based approach to security management. However, many of those IT risk management practices still suffer from a degree of ...
The passage of the American Recovery and Reinvestment Act of 2009 incents hospitals and other providers that implement and demonstrate meaningful use of healthcare IT. As a result, more and more ...
Forbes contributors publish independent expert analyses and insights. I cover logistics and supply chain management. If I was asked to vote for the most interesting solution set that has come to the ...
The state of North Dakota detects about 4 billion cyber-related attacks a year on its systems and networks. “We get hit with a lot of different attacks,” explained Michael Gregg, North Dakota’s chief ...
When planning for the future, one significant mistake I see business owners make comes when addressing risk. More specifically, I see small business owners commonly fail to address risk fully in their ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results