There is a perception that ERP automation is focused primarily on financial systems, but as Kenny Mullican writes, it can deliver value in many other functions, too.
Search Results: risk management (767)
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Every company today is — or is on its way to becoming via digital transformation — a technology company, but where does all the technology come from? Partners ecosystems.
Wayne Sadin shares takeaways from a recent panel discussion he attended, which covered topics from data management to AI and machine learning bias.
When you can’t pay less for the goods and services you buy, you may find an opportunity to reduce costs in how you are buying them, writes Joanna Martinez.
To prevent data breaches, organizations must prioritize data governance; there’s a big collaboration opportunity between the CISO and CDO roles in this endeavor.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Chief procurement officers and CFOs don’t always see financial results the same way, but applying automation to data gathering and analysis can help them get on the same page.
Rob Wood explains why security teams need to be trained to assess risk and maintain compliance across different clouds.
As the pace of business accelerates, automating ERP processes helps companies remain competitive and achieve long-term success, says Kenny Mullican.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.
Process mining offers great opportunity to fine-tune business processes but also introduces potential risks, which can be mitigated with strong governance measures.
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.
Robert Wood analiza los riesgos de disponer de silos de datos por departamentos, conocidos y aporta recomendaciones para mejorar la situación.
These six cybersecurity practices can help board members create robust protocols to protect their organizations against diverse threats and attacks.
Healthcare cloud adoption introduces benefits including more open data sharing for streamlined research and financial operations.
The considerable benefits of multi-cloud architecture must be weighed against challenges like complexity and governance.
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Multi-cloud provides flexibility, scalability, and cost efficiency, but securing this architecture requires a comprehensive approach. Frank Domizio explains.