IT risk management News
August 28, 2017
A small public cloud platform market means low prices and innovation -- but going all-in with one vendor invites considerable risk, a report shows.
June 26, 2017
Identity and access management tools are critical today, as companies seek ways to handle users' distributed resources. IT shops have tough choices in an evolving market.
May 31, 2017
Dell EMC said partners can offer flexible consumption models, which aim to reduce financial risks for customers with changing infrastructure requirements.
May 24, 2017
Trump administration 'cyber czar' Rob Joyce outlined how the government plans to combat cybersecurity gaps at an event in Boston.
IT risk management Get Started
Bring yourself up to speed with our introductory content
In conducting an IT risk assessment, are you asking the right questions to your staff? Are you talking to the right people? These elements are important for disaster recovery. Continue Reading
The best-run organizations will have a technology infrastructure in place to thoroughly support the business and all its goals. While most companies fall short of that perfection, even an operation that's close to the ideal should feel good about its technological capabilities. The trick is to not feel too good for too long.
An IT environment won't continue to perform at a high level without some help, so it's worth thinking about where you are on the early adopter curve. IT decision-makers should be open to deploying new products and services.
The cover story for this issue of Modern Infrastructure explores the questions around how an IT team should approach new technologies and strategies. The accepted wisdom in most organizations has traditionally been to let the risk-takers chase the latest, coolest thing hitting the market. It was wise, went this way of thinking, to let others figure out if a new product works -- or doesn't. If that tempting new thing proves its value, then the smart money would step up and give the go-ahead for implementation.
But now, as the pace of change in both business and IT continues to accelerate, the greater risk might be to implement a technology too late rather than too early. An organization that is willing to take some risk stands to gain an advantage, possibly a significant one, if it figures out how to capitalize on a fresh technology before its competitors do. For this reason, it might be time to rethink your position on the early adopter curve.
So even if your infrastructure is as good as it can be now, don't get too comfortable. What's true today might not be true tomorrow.Continue Reading
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
Evaluate IT risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Shadow IT risk continues to plague companies, but some are finding ways to allow citizen developers to use these unsanctioned applications -- with certain restrictions. Continue Reading
Internet of things security concerns are causing business continuity and disaster recovery professionals to create new risk assessments and business impact analyses. Continue Reading
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
Manage IT risk management
Learn to apply best practices and optimize your operations.
IoT compliance will be a challenge, especially with expanding guidance and standards. EmeSec's Maria Horton explains how to tackle the task and offers essential steps to take now. Continue Reading
Employees that use unsanctioned apps can jeopardize the business. Cloud App Discovery generates detailed reports on unapproved services to help IT mitigate risk. Continue Reading
Can API management and microservices management be combined? Tom Nolle sets the record straight on how and why they should be more together than separate. Continue Reading
Problem Solve IT risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A new exploit of CLDAP servers can be used for a DDoS reflection attack that gives attackers a 70x boost. Nick Lewis explains how to defend against this new threat. Continue Reading
Vulnerabilities in Java and Python have opened them up to possible FTP injections. Expert Nick Lewis explains how enterprises can mitigate these attacks. Continue Reading
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options available to companies for securing physical data movement. Continue Reading