Sign up | Login with →

Risk Management


Is Your Disaster Recovery Plan Enough to Protect Your Network, Data & IT Assets?

September 17, 2015 by Daan Pepijn

Disaster recovery is nothing new for enterprises. Those with on-premises infrastructure will often invest in additional disaster-recovery tools, such as remote backups, archives, etc. However, for small businesses, disaster recovery may be deemed costly or an unnecessary expense.[read more]


Recent Hacks Raise Questions Over Big Data Safety

September 16, 2015 by Jared Jaureguy

American big business has been plagued by a series of major security breaches. Beginning with the New York Stock Exchange (NYSE) this wave of major data breaches has led to the theft of millions of confidential documents, many of which containing account information such as payment & billing information. This security breach has put millions at major risk of identity theft.[read more]

Forecast Product Demand with Confidence

September 9, 2015 by Keith Peterson

Is your company using demand forecasting in your planning process? And are you happy with those results? Based on our interviews with hundreds of companies worldwide, we have found that among midsize manufacturers and distributors, many still use error prone spreadsheets or forecast based on historical sales data.[read more]

Managing Big Data Integration and Security with Hadoop

September 2, 2015 by Jason Parms

An open-source framework like Hadoop offers endless possibilities for development, and with a strong management group like Apache Systems behind it, one can expect increasing numbers of modules and technologies to integrate with Hadoop to enable your business to achieve its Big Data goals – and maybe even go significantly beyond what you can envision today.[read more]

Automate the Boring But Essential Parts of Your Data Warehouse

August 12, 2015 by Keith Peterson

To deliver on your company’s future demands for data and insights, you will need to maintain your existing data warehouse – and add the great new capabilities available with big data management and in-memory analytics. The real opportunity is in making those technologies work together smoothly with minimum effort and risk.[read more]

Want More Actionable Information from Your BI? Support Your IT Team’s Need for Data Warehouse Automation

August 6, 2015 by Keith Peterson

If your organization is relatively new to BI but has successfully built some new reports with one of the great visualization tools on the market, you will soon find yourselves in need of a better data organization environment.[read more]


As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

August 6, 2015 by Daniel Matthews

Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]

Using Procurement Analytics to Simplify Your Supplier Reconciliation

July 20, 2015 by Keith Peterson

Ask finance managers to name a necessary evil of their responsibilities and many will cite reconciling goods received against invoices not received (“GR-NI”). The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business.[read more]


Adopting a User Behavior Analytics (UBA) Solution

June 25, 2015 by Idan Tendler

The key to stopping hackers & rogue employees already exists in the enterprise in the form of user related data repositories. With the right analytics that focus on user behavior, security analysts can gain much needed context to better understand the insider threats they face on a daily basis.[read more]

How to Ensure Protection of Critical Business Data

May 26, 2015 by Peter Davidson

Hackers and digital scam artists who make a living out of stealing sensitive business related information from corporate computers have been in existence for as long as the internet has existed. Trade secrets and classified e-mail threads are often published online and sold to the highest bidder by these hackers, which can cause incalculable damage to the reputation and wellbeing of the company in question.[read more]


5 Questions to Ask as You Prepare for a Compliance Audit

May 12, 2015 by Brad Thies

For most cloud service providers, a compliance audit is, at best, a necessary evil — the root canal of the business world. Like a root canal, it can be a painful process that you regret about halfway through, even if you know it’s good for you. But just as you can avoid root canals with proper dental hygiene and regular checkups, the pain of compliance audits can be avoided with proper preparation.[read more]


Why Returning $1 Trillion to Shareholders is a Bad Idea

May 4, 2015 by Paul Barsch

Risky Business column.

With creaking IT infrastructures and under-investment in other areas such as plants, equipment, employee training and more, excessive share buybacks aren't just a flawed strategy; they are a dangerous one for the future health of companies across the globe.[read more]


Learn from Carnegie Mellon’s School of Data Management Hard Knocks

April 23, 2015 by Jeff Brown

Big data error.

The school mistakenly sent acceptance emails to hundreds of hopefuls who applied to Carnegie Mellon’s prestigious Master of Science in Computer Science program. A few hours later, an email with a much different tone arrived in their inboxes. A school statement read: “This error was the result of serious mistakes in our process for generating acceptance letters.”[read more]


Problems with the Language of Probability

April 6, 2015 by Paul Barsch

Risky Business column.

Using probabilistic terminology to communicate the “likelihood” of an event occurring to those untrained in understanding such terms, can in some instances lead to the ruin of careers, companies and in worst cases—loss of life.[read more]

Digital Risk Management: Why Cyber Security Measures Aren’t Enough

February 19, 2015 by Michael McQuinn

Cyber security.

Most companies of scale have cyber security measures in place – software solutions, policies and protocols, and regular assessments conducted by IT staff members around compliance and efficacy. With these measures in place, the executive management team might feel confident that their digital data is secure – until they’re blind-sided by crisis-inducing error or a data leakage event.[read more]