In this Acceleration Economy roundtable, analysts Aaron Back, Wayne Sadin, and Kenny Mullican discuss the practical applications of AP automation to streamline supply chain processes.
Search Results: risk management (721)
Is your organization equipped to handle the loss of a key IT team member? Will certain critical functions within the…
As technological systems become more complex through Cloud, microservices, IoT, and more, the need for sound vulnerability management is even more paramount.
While secrets management has been a challenge, it’s critical that organizations have a game plan for when a credential leak occurs.
As the future is certainly digital, organizations need to ensure they are able to manage digital risk and growth.
Cloud-based ERP solutions come with a host of benefits: They’re scalable and flexible, and team members can easily access information…
Over the past two years, the supply chain has exemplified how the right partner relationships can help reduce risks.
As everyone is moving to the cloud, businesses should be aware of these five pitfalls of cloud data management to be prepared.
This four-step framework can help guide your company through the process in actively implementing risk management.
CXOs should consider channel partners, as they can provide solutions to recover from and prevent cyber attacks.
With the risk of Ransomware increasing, organizations need to apply this guidance to prepare and prevent attacks.
Board members need to be aware of these top three risks that they may face in the boardroom to determine appropriate responses.
In this Future Office of the CXO Minute, Wayne Sadin breaks down risk fundamentals and what Boards & C-Suite executives should be talking about.
EBizCharge and Avalara have combined their expertise in the financial sector to create a comprehensive guide that covers the “must-haves” in managing finance risks.
Metrics are essential to running any security program — especially when developing a vulnerability management program.
With an abundance of cybersecurity tools, vulnerability management can benefit from simplifying the user experience.
With a lack of standards for risk assessment, cybersecurity tools may be leading to more confusion when determining risk prioritization.
Enterprise Patch Management best practices include mitigating disruptions, inventorying software assets, and defining risk response scenarios.
What’s in store for the database industry in the year ahead? Check out these major predictions about the future of data management.
While there are clear benefits of cloud, one of the biggest liabilities of the cloud comes in the form of cybersecurity.