New & Notable
Enterprise risk management News
September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
August 01, 2014
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame? Plus, download Facebook's Messenger app or bust, and glasses might soon become moot -- all in this week's Searchlight.
June 23, 2014
At its annual security event, Gartner talked up Internet of Things security and not being compliance-focused, but both clash with practical concerns.
June 13, 2014
It started with a gesture of love and resulted in an unintentional TweetDeck hack that exposed an overlooked XSS vulnerability. This story and more in Searchlight.
Enterprise risk management Get Started
Bring yourself up to speed with our introductory content
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ... Continue Reading
Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative software, such as unified communication and ... Continue Reading
A limitation of liability clause is the section in a service-level agreement (SLA) that specifies the amounts and types of damages that each party will be obliged to provide to the other in particular circumstances. In a legal context, a liability ... Continue Reading
Evaluate Enterprise risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Manage Enterprise risk management
Learn to apply best practices and optimize your operations.
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager. Continue Reading
Prepare for IT disaster of any kind with this Essential Guide, which offers CIOs advice on prevention, mitigation and business continuity. Continue Reading
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
Problem Solve Enterprise risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Identify, monitor and vanquish threats to the business with this Essential Guide for CIOs on enterprise risk management strategy and planning. Continue Reading
Is your organization equipped to handle an emerging host of privacy threats? Take our risk management planning quiz to find out. Continue Reading
Top security threats, recent fraud cases and the potential for human error have CIOs looking ahead to new security tools, our #CIOchat-ters say. Continue Reading