Latest In

risk management

IT Risk Assessment vs. IT Risk Management: The Difference and What They Mean to the Service Desk
May 28, 2020
Liz Beavers
In life, risks can be perceived both negatively and positively. Taking a risk can sometimes yield great results, but other times, a risk is a yellow light of caution. For…
Assessing Risk – The Key to IT Security — SolarWinds TechPod 023
February 18, 2020
SolarWinds
When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation.…
Federal IT Pros Optimistic About Security, but Insider Threats Remain a Challenge
January 7, 2020
Jim Hansen
Federal IT professionals feel threats posed by careless or malicious insiders and foreign governments are at an all-time high, yet network administrators and security managers feel like they’re in a…
Better Visibility Can Help Improve Your FITARA scores
October 29, 2019
Mav Turner
The most recent version of the scorecard measuring agency implementation of the Federal IT Acquisition Reform Act gave agencies cause for both celebration and concern. On the whole, scores in…
6 Risk Management Best Practices You Can Implement Today
August 29, 2019
Matt Cox
Understanding risk management (and why it’s important) as I highlighted in my last post, Why Risk Management Is Critical to Your IT Infrastructure, is essential as you begin to plan…
Why Risk Management Is Critical to Your IT Infrastructure
August 23, 2019
Matt Cox
Picture this. It’s late 2006, we’re on the verge of the 2008 economic collapse in the United States, and an investment bank makes a strategic move. Their data models show…
The Story Patching Tells
June 14, 2019
Becky Elliott
In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did…
You Are Here – Perimeter Security
October 18, 2018
Chris Grundemann
In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you…