Sign up | Login with →

Risk Management

exclusive

Where in the World Does All this ESRI World Data Come from?

July 31, 2014 by Shawn Gordon

ESRI World Data.

ESRI does have data sets of their own that are available both for free, and for licensing. They have their own demographers who come up with various cool products like “Tapestry”, which shows life groups and their habit patterns, so you could research in there and discover NASCAR fans are good at recycling.[read more]

Data Controls and Customer Loyalty: How Big Companies Keep Clients

July 16, 2014 by Kristen Paral

Data controls and customer loyalty.

Data controls may go hand-in-hand with maintaining accurate financial information and compliance reports, but IT leaders from some of the nation’s biggest enterprises say they also use controls for something else: Customer retention.[read more]

exclusive

Beware of Big Data Technology Zealotry

June 23, 2014 by Paul Barsch

Risky Business column.

Invariably, there are hundreds of additional arguments proffered by big data vendors and technology zealots inhabiting organizations just like yours. However, there are few crisp binary choices in technology decision making, especially in today’s heterogeneous big data environments. Beware big data zealots that counsel you otherwise.[read more]

2020: US Banks Are Betting Big on Analytics

May 31, 2014 by Naagesh Padmanaban

US banks and analytics.

Most US Banks – small and big are on board this transformational journey. These initiatives involve great investments and outcomes are keenly tracked. Many careers are at stake. But those that succeed will form the backbone of US Banks 2020. This obviously will result in intense competition and change the banking landscape in the US forever.[read more]

exclusive

MDM Industry Becoming New Standard for IT

May 30, 2014 by Jessica Oaks

Mobile device management.

As more businesses implement a bring your own device (BYOD) policy, companies are turning to mobile device management (MDM) to maintain and secure company data. MDM is now becoming an industry standard for IT. MDM is a strategy that uses software to manage, monitor, secure and support mobile devices used by employees.[read more]

Attention Retailers: How to Avoid Being Attacked

April 28, 2014 by Ryan Fahey

Are your computer systems secure?

This past January, Michaels became aware of a large number of customers reporting that credit cards they’ve used at the retailer were incurring fraudulent charges. Michaels CEO Chuck Rubin announced that they were conducting an investigation.[read more]

The High Cost of Low Quality IT

April 25, 2014 by Paul Barsch

Risky Business column.

Technology purchases and implementations aren't like buying widgets. A half-baked solution full of “second choice” technologies may end up being unusable to end-users, and cut-rate implementations that are seriously delayed or over-budget can translate into lost revenues, and/or delayed time to market.[read more]

How Data Will Make Air Travel Safer

March 25, 2014 by Travis Korte

Safer airtravel with better data.

Airlines and air traffic controllers use a lot of information to keep passengers safe, integrating weather readings, physical information about the plane, passenger data, and other kinds of data. But as the uncertainty surrounding Malaysia Airlines Flight 370′s disappearance confirms, better information and ways to act on it will be crucial for the future of air safety.[read more]

exclusive

Technology Training Needs a Hands-On Approach

March 4, 2014 by Paul Barsch
5

Risky Business column.

Instead of simply a “core dump” of manuals and online training courses, technical employees should also get “hands on” simulations, boot camps and courses led by advanced robo-instructors to fully hit the ground running[read more]

exclusive

Adopting a Sucessful BOYD Implementation Strategy

February 21, 2014 by Rick Delgado
1

BOYD implementation strategy.

Each year, more and more companies are allowing their employees to use their own devices in the workplace. This system, known as “Bring Your Own Device”, or BOYD, poses unique opportunities as well as certain potential problems.[read more]

exclusive

When Big Data Turns Into a Big Nightmare!

January 22, 2014 by Bernard Marr
1

The Big Data Guru column.

For most companies today, data - especially big data - is one of their biggest assets. In this article, I look at one big data company that experienced the big data nightmare of having up to 110 million customer records stolen by thieves.[read more]

Managing Cyber Security Threats from Inside

December 30, 2013 by Thu Pham
1

Cyber security threats.

The number of annual security incidents caused by insider threats is increasing. In The CERT Guide to Insider Threats, Capelli et al write, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.”[read more]

How the Financial Services Industry Should Use Big Data to Regain Trust

December 12, 2013 by Mark van Rijmenam

regaining customer trust through big data / shutterstock

If there is any industry that can benefit from big data, it is the financial services industry. Of course the first use case that comes to mind is the ability to reduce risks, whether it be credit risk, default risk or liquidity risk. But there are many more possibilities.[read more]

exclusive

Be Wary of the Science of Hiring

December 10, 2013 by Paul Barsch
6

Risky Business column.

While reliance on experience/intuition to hire “the right person” is rife with biases, there’s also danger in over-reliance on HR analytics to find and cultivate the ultimate workforce. While HR analytics seems to have room to run, there’s still the outstanding question of whether “the numbers” matter at all in hiring the right person.[read more]

5 Webapps to Add to Your Security Tool Arsenal

November 27, 2013 by Bryan Halfpap

Your security tools.

When you’re mobile, away from the office, or just caught off-guard without your tools and security setup, you need a way to analyze, assess, and interpret emerging threats on-the-fly. That’s why these 5 free web applications are absolute must-haves for your Favorites Folder.[read more]