Sign up | Login with →

Risk Management

Automate the Boring But Essential Parts of Your Data Warehouse

August 12, 2015 by Keith Peterson

To deliver on your company’s future demands for data and insights, you will need to maintain your existing data warehouse – and add the great new capabilities available with big data management and in-memory analytics. The real opportunity is in making those technologies work together smoothly with minimum effort and risk.[read more]

Want More Actionable Information from Your BI? Support Your IT Team’s Need for Data Warehouse Automation

August 6, 2015 by Keith Peterson

If your organization is relatively new to BI but has successfully built some new reports with one of the great visualization tools on the market, you will soon find yourselves in need of a better data organization environment.[read more]

exclusive

As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

August 6, 2015 by Daniel Matthews

Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]

Using Procurement Analytics to Simplify Your Supplier Reconciliation

July 20, 2015 by Keith Peterson

Ask finance managers to name a necessary evil of their responsibilities and many will cite reconciling goods received against invoices not received (“GR-NI”). The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business.[read more]

exclusive

Adopting a User Behavior Analytics (UBA) Solution

June 25, 2015 by Idan Tendler

The key to stopping hackers & rogue employees already exists in the enterprise in the form of user related data repositories. With the right analytics that focus on user behavior, security analysts can gain much needed context to better understand the insider threats they face on a daily basis.[read more]

How to Ensure Protection of Critical Business Data

May 26, 2015 by Peter Davidson

Hackers and digital scam artists who make a living out of stealing sensitive business related information from corporate computers have been in existence for as long as the internet has existed. Trade secrets and classified e-mail threads are often published online and sold to the highest bidder by these hackers, which can cause incalculable damage to the reputation and wellbeing of the company in question.[read more]

exclusive

5 Questions to Ask as You Prepare for a Compliance Audit

May 12, 2015 by Brad Thies

For most cloud service providers, a compliance audit is, at best, a necessary evil — the root canal of the business world. Like a root canal, it can be a painful process that you regret about halfway through, even if you know it’s good for you. But just as you can avoid root canals with proper dental hygiene and regular checkups, the pain of compliance audits can be avoided with proper preparation.[read more]

exclusive

Why Returning $1 Trillion to Shareholders is a Bad Idea

May 4, 2015 by Paul Barsch

Risky Business column.

With creaking IT infrastructures and under-investment in other areas such as plants, equipment, employee training and more, excessive share buybacks aren't just a flawed strategy; they are a dangerous one for the future health of companies across the globe.[read more]

exclusive

Learn from Carnegie Mellon’s School of Data Management Hard Knocks

April 23, 2015 by Jeff Brown

Big data error.

The school mistakenly sent acceptance emails to hundreds of hopefuls who applied to Carnegie Mellon’s prestigious Master of Science in Computer Science program. A few hours later, an email with a much different tone arrived in their inboxes. A school statement read: “This error was the result of serious mistakes in our process for generating acceptance letters.”[read more]

exclusive

Problems with the Language of Probability

April 6, 2015 by Paul Barsch

Risky Business column.

Using probabilistic terminology to communicate the “likelihood” of an event occurring to those untrained in understanding such terms, can in some instances lead to the ruin of careers, companies and in worst cases—loss of life.[read more]

Digital Risk Management: Why Cyber Security Measures Aren’t Enough

February 19, 2015 by Michael McQuinn

Cyber security.

Most companies of scale have cyber security measures in place – software solutions, policies and protocols, and regular assessments conducted by IT staff members around compliance and efficacy. With these measures in place, the executive management team might feel confident that their digital data is secure – until they’re blind-sided by crisis-inducing error or a data leakage event.[read more]

Business Analytics Error: Learn from Uber’s Mistake During the Sydney Terror Attack

January 24, 2015 by RK Paleru
2

Uber.

Recently, as a sad day of terror ended in Sydney, a bad case of Uber’s analytical approach to pricing came to light - an “algorithm based price surge.” Uber’s algorithm driven price surge started overcharging people fleeing the Central Business District (CBD) of Sydney following the terror attack.[read more]

exclusive

Is Your IT Architecture Ready for Big Data?

January 6, 2015 by Paul Barsch

Risky Business column.

Companies desperately need to assess their current situation and future business needs, and then design and deliver on a IT architecture that will deliver insights from all data types.[read more]

exclusive

The World’s Largest, Fastest, Most Agile Supply Chain

December 31, 2014 by Keith Peterson

Supply chain.

There is one shipping firm in the world, maybe the galaxy, that is counted on more than FedEx, UPS, and DHL combined. In fact, this organization has an even more complex supply chain. It takes its own orders, makes its own goods, and ships them all in one night.[read more]

exclusive

Cyber Security: Locking Out the Grinch from Your Application Network

December 18, 2014 by Bob Dvorak

Security.

How do you leave your chimney open for Santa while keeping the Grinch safely locked out? The right application management strategy can help outline where vulnerabilities lie and how to fix security weaknesses, minimizing your organization’s overall attack surface.[read more]