Handling 17 million packages every day, FedEx joins forces with Microsoft to redefine commerce with a cross-platform logistics-as-a-service solution.
Search Results: risk management (766)
With an effective business case, organizations can clearly define goals aligned with outcomes & build trust with stakeholders and leadership.
With the development of new technologies, the cybersecurity landscape requires a new tool to address potential vulnerabilities.
Reducing the technical barriers of traditional development, low-code development is transforming the finance sector.
AI needs data and data needs data scientists and they need ML tools. At the core, Domino equips data scientists with these essential capabilities.
As a mode of communication for security teams, vulnerability reports require effective management but often involve a problematic process.
Can you accept data insights that show both the good & bad about your company & people? Scott Vaughan joins the Back @ IT podcast to dive into this topic and the importance of having a data culture.
When faced with vulnerabilities, businesses often have to focus on the most severe cases. But, vulnerability management needs to go beyond these scoring frameworks.
Ransomware has continued to evolve and 2021 saw multiple high-profile attacks that led to significant socio-economic disruptions.
The process, data, and technology for B2B revenue generation is rapidly changing. How will this impact your business?
As the cybersecurity landscape is rapidly changing, these cybersecurity startups are on the rise with the vast adoption of new technologies.
Businesses are adapting to a new normal. Emerging technologies will drive this change over the next year.
What will the next year look like for Boards and CEOs? Check out how social changes and technology development has led to these top-down implications and predictions.
IT governance is traditionally clunky and bureaucratic. How can we balance innovation with governance in the age of citizen development?
With high-profile breaches occurring on a near-daily basis, CFOs must understand trends in cyber security & finance and mitigation.
Since data privacy is so complex, CFOs and other business leaders need to understand it and how to respond if data is compromised.
The panoply of software solutions and digital services available to manufacturers keeps getting more powerful, more varied, more versatile —…
Demand management and IT Steering Committees work to control the supply and demand imbalance caused by Shadow IT.
CLEVR shares how low-code platforms like Mendix are bringing powerful capabilities to innovate Product Lifecycle Management (PLM) systems.
As technology progresses at a frenetic pace, global financial departments are under severe pressure to improve operational efficiency, decrease costs, and boost output.