New & Notable
Enterprise risk management News
September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
August 01, 2014
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame? Plus, download Facebook's Messenger app or bust, and glasses might soon become moot -- all in this week's Searchlight.
June 23, 2014
At its annual security event, Gartner talked up Internet of Things security and not being compliance-focused, but both clash with practical concerns.
June 13, 2014
It started with a gesture of love and resulted in an unintentional TweetDeck hack that exposed an overlooked XSS vulnerability. This story and more in Searchlight.
Enterprise risk management Get Started
Bring yourself up to speed with our introductory content
Unsystemic risk (also known as unsystematic risk) is a type of investment risk that is specific to an industry or organization. Continue Reading
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ... Continue Reading
A shadow app is a software program that is not supported by an employee's information technology (IT) department. Continue Reading
Evaluate Enterprise risk management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Manage Enterprise risk management
Learn to apply best practices and optimize your operations.
An email arrives from on high ordering IT to complete a project ASAP. The CIO marshals the troops. When it comes to disaster recovery, however, it's the CIO's duty to just say, 'No.' Continue Reading
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager. Continue Reading
Prepare for IT disaster of any kind with this Essential Guide, which offers CIOs advice on prevention, mitigation and business continuity. Continue Reading
Problem Solve Enterprise risk management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A hybrid security defense begins by ranking potential risks by likelihood and impact, then hiring experts to shore up defenses. Continue Reading
Identify, monitor and vanquish threats to the business with this Essential Guide for CIOs on enterprise risk management strategy and planning. Continue Reading
Is your organization equipped to handle an emerging host of privacy threats? Take our risk management planning quiz to find out. Continue Reading