IT risk management News
June 26, 2017
Identity and access management tools are critical today, as companies seek ways to handle users' distributed resources. IT shops have tough choices in an evolving market.
May 31, 2017
Dell EMC said partners can offer flexible consumption models, which aim to reduce financial risks for customers with changing infrastructure requirements.
May 24, 2017
Trump administration 'cyber czar' Rob Joyce outlined how the government plans to combat cybersecurity gaps at an event in Boston.
April 28, 2017
The pharmaceutical company is using a cloud access security broker to gain visibility into cloud usage -- and reduce risk.
IT risk management Get Started
Bring yourself up to speed with our introductory content
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
Evaluate IT risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Internet of things security concerns are causing business continuity and disaster recovery professionals to create new risk assessments and business impact analyses. Continue Reading
Business velocity has changed the approach to service delivery and the IT value stream. Achieving 'fast flow' through optimization of IT processes can enable better, faster IT. Continue Reading
Enterprises have a love/hate relationship with shadow IT. When it comes with risks, its presence also drives technological innovation. Find out how to make shadow IT work for your enterprise. Continue Reading
Manage IT risk management
Learn to apply best practices and optimize your operations.
DevOps is the change everyone wants, until it means new processes. The difficult but rewarding shift to a DevOps process flow reimagines everything from releases to incident response. Continue Reading
In a volatile landscape, where customer expectations and supply chain complexity are growing by the day, you can't afford to bring anything but your A-game. This guide shows you how. Continue Reading
A cloud-era shadow IT policy still needs to manage risk, but the era of "no way" is giving way to allow users quick access to the productivity apps they need. Continue Reading
Problem Solve IT risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Vulnerabilities in Java and Python have opened them up to possible FTP injections. Expert Nick Lewis explains how enterprises can mitigate these attacks. Continue Reading
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options available to companies for securing physical data movement. Continue Reading
Over the years, managing supply and demand has become increasingly complicated. Here's a look at factors that influence today's supply chain risk assessments. Continue Reading