New & Notable
Enterprise risk management News
September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
August 01, 2014
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame? Plus, download Facebook's Messenger app or bust, and glasses might soon become moot -- all in this week's Searchlight.
June 23, 2014
At its annual security event, Gartner talked up Internet of Things security and not being compliance-focused, but both clash with practical concerns.
June 13, 2014
It started with a gesture of love and resulted in an unintentional TweetDeck hack that exposed an overlooked XSS vulnerability. This story and more in Searchlight.
Enterprise risk management Get Started
Bring yourself up to speed with our introductory content
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ... Continue Reading
A shadow app is a software program that is not supported by an employee's information technology (IT) department. Continue Reading
A limitation of liability clause is the section in a service-level agreement (SLA) that specifies the amounts and types of damages that each party will be obliged to provide to the other in particular circumstances. In a legal context, a liability ... Continue Reading
Evaluate Enterprise risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Use Of Solution: I worked on version 5 and then 6 for a total of 6 years. My personal score is 4 stars based on my experience with the latest...Continue Reading
Support can retrieve salient logging data from massive distributed systems in seconds but deployment is not easy.Powered by IT Central Station
I've been using Splunk for over 3 years now. The most valuable feature for me is alerting. Using Splunk, production support teams can retrieve...Continue Reading
I've evaluated Splunk and IBM Q1 but LogLogic is the best choice for log management. SIEM funcionailty needs improvementPowered by IT Central Station
Rating: If considering only the log management functionality (collecting, storing, search engine, reporting, alerting, etc.), I would give it...Continue Reading
Manage Enterprise risk management
Learn to apply best practices and optimize your operations.
An email arrives from on high ordering IT to complete a project ASAP. The CIO marshals the troops. When it comes to disaster recovery, however, it's the CIO's duty to just say, 'No.' Continue Reading
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager. Continue Reading
Prepare for IT disaster of any kind with this Essential Guide, which offers CIOs advice on prevention, mitigation and business continuity. Continue Reading
Problem Solve Enterprise risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Identify, monitor and vanquish threats to the business with this Essential Guide for CIOs on enterprise risk management strategy and planning. Continue Reading
Is your organization equipped to handle an emerging host of privacy threats? Take our risk management planning quiz to find out. Continue Reading
Top security threats, recent fraud cases and the potential for human error have CIOs looking ahead to new security tools, our #CIOchat-ters say. Continue Reading