Sign up | Login with →

Risk Management

exclusive

Role of Risk Audits: How the Cloud & Big Data have Changed Them

June 15, 2016 by Rehan Sheikh

The role of an auditor has changed rapidly over the past decade. Big data is now allowing auditors to make better decisions, while at the same time making that process more complicated. Today, future financial auditors must process a strong background and skillset in IT in order to keep up with the industry trends.Big Data Presents New...[read more]

exclusive

Strategies to Implement Data Centre Disaster Recovery Plan in Your IT

June 14, 2016 by Rehan Sheikh

What to Do When Your Backup Data is DestroyedAccording to the book, Disaster Recovery Planning: Managing Risk and Catastrophe in Information Systems, written by Jon William Toigo, “A company that experiences a computer outage lasting for more than 10 days will never fully recover financially and that 50 percent of companies suffering...[read more]

Disaster Recovery Solutions in Cloud Infrastructure

April 5, 2016 by Kelvin Smith

What strikes your mind first when you hear about disaster recovery? One can say recovery or continuation of systems and proper functioning of systems after occurrence of any disaster. If we talk about disaster recovery in the world of cloud computing, the term Disaster Recovery is quite new. But are you aware of top cloud disaster recovery concerns?[read more]

exclusive

Big Data in the Sports Industry

December 23, 2015 by Trisha Miller

Professional athletes everywhere are being asked to wear tech that will track their every move and download patterns of their stats. Will this help to improve the game or could the usage of big data destroy sports as we know it?[read more]

exclusive

Big Data Helps Alleviate Aviation Risk Management Problems

December 23, 2015 by Sarah Smith

Today, an increasing number of commercial airlines employ Big Data and real time analysis to help alleviate problems in many traditional areas of aviation risk management. Modern aviation safety management systems suggestion here can benefit from the creative use of these high tech tools in a variety of ways. Passengers have already begun to see the benefits.[read more]

exclusive

Is Your Disaster Recovery Plan Enough to Protect Your Network, Data & IT Assets?

September 17, 2015 by Daan Pepijn

Disaster recovery is nothing new for enterprises. Those with on-premises infrastructure will often invest in additional disaster-recovery tools, such as remote backups, archives, etc. However, for small businesses, disaster recovery may be deemed costly or an unnecessary expense.[read more]

exclusive

Recent Hacks Raise Questions Over Big Data Safety

September 16, 2015 by Jared Jaureguy
1

American big business has been plagued by a series of major security breaches. Beginning with the New York Stock Exchange (NYSE) this wave of major data breaches has led to the theft of millions of confidential documents, many of which containing account information such as payment & billing information. This security breach has put millions at major risk of identity theft.[read more]

Forecast Product Demand with Confidence

September 9, 2015 by Keith Peterson

Is your company using demand forecasting in your planning process? And are you happy with those results? Based on our interviews with hundreds of companies worldwide, we have found that among midsize manufacturers and distributors, many still use error prone spreadsheets or forecast based on historical sales data.[read more]

Managing Big Data Integration and Security with Hadoop

September 2, 2015 by Jason Parms
5

An open-source framework like Hadoop offers endless possibilities for development, and with a strong management group like Apache Systems behind it, one can expect increasing numbers of modules and technologies to integrate with Hadoop to enable your business to achieve its Big Data goals – and maybe even go significantly beyond what you can envision today.[read more]

Automate the Boring But Essential Parts of Your Data Warehouse

August 12, 2015 by Keith Peterson

To deliver on your company’s future demands for data and insights, you will need to maintain your existing data warehouse – and add the great new capabilities available with big data management and in-memory analytics. The real opportunity is in making those technologies work together smoothly with minimum effort and risk.[read more]

Want More Actionable Information from Your BI? Support Your IT Team’s Need for Data Warehouse Automation

August 6, 2015 by Keith Peterson

If your organization is relatively new to BI but has successfully built some new reports with one of the great visualization tools on the market, you will soon find yourselves in need of a better data organization environment.[read more]

exclusive

As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

August 6, 2015 by Daniel Matthews

Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]

Using Procurement Analytics to Simplify Your Supplier Reconciliation

July 20, 2015 by Keith Peterson

Ask finance managers to name a necessary evil of their responsibilities and many will cite reconciling goods received against invoices not received (“GR-NI”). The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business.[read more]

exclusive

Adopting a User Behavior Analytics (UBA) Solution

June 25, 2015 by Idan Tendler

The key to stopping hackers & rogue employees already exists in the enterprise in the form of user related data repositories. With the right analytics that focus on user behavior, security analysts can gain much needed context to better understand the insider threats they face on a daily basis.[read more]

How to Ensure Protection of Critical Business Data

May 26, 2015 by Peter Davidson

Hackers and digital scam artists who make a living out of stealing sensitive business related information from corporate computers have been in existence for as long as the internet has existed. Trade secrets and classified e-mail threads are often published online and sold to the highest bidder by these hackers, which can cause incalculable damage to the reputation and wellbeing of the company in question.[read more]