risk management | TechWell

risk management

Why Are Credential Stuffing Attacks On The Rise?

Malicious hackers have an abundance of attack methods at their disposal, ranging from the crude to the highly sophisticated. Credential stuffing is a type of brute force cyber attack that is increasing in popularity, and this article seeks to explain why.

Ronan Mahony's picture
Ronan Mahony
Records Management Why You Should Automate Compliance

Compliance policy is one of those things most employees find boring and useless. However, for employers, staying compliant is one of the most crucial tasks and can have serious legal and financial repercussions if not done properly. But how can you make following compliance policy easier for your employees?

Alex Morgan's picture
Alex Morgan
A Physical Metaphor for Quick Fixes and Root Cause Analysis

If you deal with legacy code you’ve likely found yourself struggling to debug and fix a mysterious, intermittent problem. Along the way you may have discovered some code that didn’t quite make sense.

Steve Berczuk's picture
Steve Berczuk
Risk Project Management Schedule Risk Analysis

Building schedules for complex projects is challenging. While the results are never perfect, credible schedules are a useful communication and coordination device. Incredible schedules are a dangerous waste of time and energy that damage a project manager’s credibility and cost an enterprise a fortune.

Payson Hall's picture
Payson Hall
Software engineer looking at her computer monitors and integrating code Code Integration: When Moving Slowly Actually Has More Risk

Many decisions about code branching models are made in the name of managing risk, and teams sometimes pick models that make integration harder in the name of safety. Moving slowly and placing barriers to change can seem safer, but agile teams work best when they acknowledge that there is also risk in deferring change.

Steve Berczuk's picture
Steve Berczuk
Mouse trap with cheese An Evolutionary Approach to Risk Management

Risk management is identifying, analyzing, mitigating, and monitoring risks to a project. Humans do this all the time with life experiences, so there are parts of risk management that come naturally to us. What needs to be learned is recognizing our biases and limits to our visualization. Ask these questions to help.

Payson Hall's picture
Payson Hall
A tester going over software code 8 Questions to Ask before Fixing a Defect

Some defects require a fix, without a doubt. But not all defects are created equal, so careful thought should be applied before a defect is fixed. The goal isn’t to fix every reported defect; it’s to return value to the customer and profit to the company. These eight questions can help in the decision-making process.

Richard Estra's picture
Richard Estra
Chainlink fence Continuous Risk Management in Cybersecurity

Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk.

Max Emelianov's picture
Max Emelianov