IT risk management News
June 26, 2017
Identity and access management tools are critical today, as companies seek ways to handle users' distributed resources. IT shops have tough choices in an evolving market.
May 31, 2017
Dell EMC said partners can offer flexible consumption models, which aim to reduce financial risks for customers with changing infrastructure requirements.
May 24, 2017
Trump administration 'cyber czar' Rob Joyce outlined how the government plans to combat cybersecurity gaps at an event in Boston.
April 28, 2017
The pharmaceutical company is using a cloud access security broker to gain visibility into cloud usage -- and reduce risk.
IT risk management Get Started
Bring yourself up to speed with our introductory content
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
Evaluate IT risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Internet of things security concerns are causing business continuity and disaster recovery professionals to create new risk assessments and business impact analyses. Continue Reading
Business velocity has changed the approach to service delivery and the IT value stream. Achieving 'fast flow' through optimization of IT processes can enable better, faster IT. Continue Reading
Enterprises have a love/hate relationship with shadow IT. When it comes with risks, its presence also drives technological innovation. Find out how to make shadow IT work for your enterprise. Continue Reading
Manage IT risk management
Learn to apply best practices and optimize your operations.
In a volatile landscape, where customer expectations and supply chain complexity are growing by the day, you can't afford to bring anything but your A-game. This guide shows you how. Continue Reading
A cloud-era shadow IT policy still needs to manage risk, but the era of "no way" is giving way to allow users quick access to the productivity apps they need. Continue Reading
Don’t treat privacy compliance as drag n’ drop; take these steps to progress your IoT data privacy journey and get ready for your GDPR close-up. Continue Reading
Problem Solve IT risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options available to companies for securing physical data movement. Continue Reading
Over the years, managing supply and demand has become increasingly complicated. Here's a look at factors that influence today's supply chain risk assessments. Continue Reading
Today's enterprise network finds itself under unprecedented strain, with the number of connected devices and "things" increasing and end-user expectations of speed and performance growing. Meanwhile, as IT professionals strive to offer the latest and greatest technological services to customers, network resources don't always keep pace. Something has to give.
Such a scenario is ripe for significant, unscheduled network downtime, and in the digital age, these outages come at large scale and enormous cost. Enterprises that have recently experienced major network downtime -- such as Delta Airlines and Salesforce -- have lost millions of dollars and suffered incalculable blows to their brands and reputations. Organizations simply can't afford outages like these in today's digital-first business environment. In this edition of Network Evolution, we explore the dynamics of the modern outage, and how enterprises can minimize their risk of network downtime.
Also in this issue, we take a look at evolving automation tools and how they can make network managers' lives easier. And finally, we'll tell you what you need to know about Cisco's new digital whiteboard, Spark Board, and how it stacks up against Microsoft's Surface Hub.Continue Reading