IT Risk Management Articles

Sorted By: Most Recent
Matthew Urwin Matthew Urwin
Updated on April 22, 2024

What Is Financial Risk Management?

Financial risk management includes identifying, assessing and addressing potential threats to a business’s financial resources.

Image: Shutterstock / Built In
Alex Vakulov Alex Vakulov
Updated on April 20, 2024

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

Images: Shutterstock / Built In
Kevin Miller Kevin Miller
Updated on April 20, 2024

The 3 Hammers of IT Management

By creating or purchasing self-service tools, your IT department can decrease the cost of operation, lower queue times and increase customer satisfaction.

Edward Hearn Edward Hearn
Updated on April 19, 2024

Are You Thinking About Risk the Wrong Way?

To make effective risk assessments, you need to understand the difference between relative and absolute risk.

Vaidotas Šedys Vaidotas Šedys
Updated on April 15, 2024

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

Image: Shutterstock / Built In
John Funk John Funk
Updated on April 09, 2024

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

Image: Shutterstock / Built In
James Stanger James Stanger
Updated on December 19, 2023

How to Reduce Technical Debt and Bolster Your Cybersecurity

Failing to integrate IT best practices and team members into technical decisions can lead to ransomware attacks, data breaches and more. Here’s how to fix it.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on November 22, 2023

Guide to Using SSH Port Forwarding (SSH Tunneling)

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Image: Shutterstock / Built In
Bhopi Dhall and Saurajit Kanungo Bhopi Dhall and Saurajit Kanungo
Updated on November 16, 2023

Bridging the Gap Between IT and Business

What causes friction between business people and IT professionals, and how can we fix it?

Image: Shutterstock / Built In