risk-management

Healthcare services company simplifies architecture, lowers costs with IBM Cloud

Patients, insurance organizations and regulatory bodies hold high expectations from healthcare organizations. Processes are complex, exposed to numerous risks and must comply with a growing number of healthcare laws. A good and reliable recording of information, assurance of processes and simple communication about these are essential, but often fall short. The Patient Safety Company (TPSC) […]

Continue reading

Cloud resiliency: The key to mitigating risk

I was browsing my twitter feed recently, and I ran across a CloudEndure-sponsored survey on public cloud disaster recovery. The survey reported that the top four cloud risks were application bugs, network failures, human errors and cloud provider downtime. The first three risks commonly crop up in most risk and resiliency surveys, including IBM’s annual […]

Continue reading

How to stop a 75-year-old woman from destroying your business

A 75-year-old woman in the country of Georgia single-handedly stopped all Internet access to Armenia during 2011.

Continue reading

Risks & Issues: Effective management for cloud commercial customers

This blog entry is about managing risks and issues when providing cloud services to commercial customers. Managing service provider internal risks when using cloud technology is out of scope of this blog entry. Also any risk evaluation whether or not to migrate information assets or applications to cloud solutions is not regarded here.

Continue reading

IT security processes overview and cloud

IT security concerns are one major hindrance why IBM’s commercial customers hesitate to embrace emerging cloud technologies. A good method to address those concerns is to evaluate each IBM global IT security process one by one and to compare the process execution in the traditional IT environment with the same in the cloud environment: If the processes are executed in a similar fashion or as documented deviations with correct acceptances of the related risks, there is no objection from the IT security process perspective to use cloud solutions.

Continue reading