Important Update: Community URLs redirect issues are partially resolved. Learn More. .

cancel
Showing results for 
Search instead for 
Did you mean: 
Archer Blogs
Learn about the latest news for the Archer Suite

Forum Posts

Vulnerability Risk Management: Metrics that Matter

In my previous blogs (Vulnerability Risk Management: Lets not boil the Ocean and ulnerability Risk Management - It is a Big Deal) in this series, I focused on how important Vulnerability Risk Management is for organizations and the need to take it be...

Vulnerability Risk Management - It is a Big Deal

In every organization, there is a universe of Devices and a universe of Vulnerabilities. Security Teams use Vulnerability Scanners to identify where systems are vulnerable. These scanners produce pages and pages of reports that are given to IT itemiz...

Inline Editingis HERE!

I suspect this headline might get an outburst of excitement, a few high fives, maybe even a virtual ‘Wave’ across cyberspace. Yes indeed, inline editing is now available with our latest release of the Platform 5.4 SP1. And do we have a deal for you! ...

ILE Image.png Dynamic Filtering.png
Anonymous by Not applicable
  • 2255 Views
  • 0 comments
  • 2 kudos

Breaking the Value Ceiling

My team and I have been having many discussions lately on the evolution of GRC programs and the value of integrating or supplementing tangential processes with data flowing in and out of risk management activities. Much of this discussion is fueled b...

How do you Know about your Know How?

Cliff Stoll’s The Cuckoo’s Egg was one of the major influences in my early career. The tale of a lone astronomer doggedly pursuing an accounting error on the mainframe to discover a nefarious hacker with international spook connections combined eleme...

New Localized Content Available!

Those of you that have followed Archer’s multi-lingual march around the globe already know about Archer’s core libraries we’ve previously translated into French, German, Spanish, and Japanese. I’m pleased to announce the addition of Italian, Portugue...

Chasing the Curve

When I was in school, one of the biggest topics of conversation around test time was the “Curve”. For some students, it was a blessing raising their probability of passing. For others, the Curve meant that their final grade may or may not be affected...

Groove Theory of GRC: The Swan Song

All great shows must come to an end. The curtain is nearly closed and the last echoes of my final song are waning as I finish up my series on the “Groove Theory of GRC”. I hope you have enjoyed this running analogy and it has given you a few ideas on...

GRC Ref Arch.jpg

Groove Theory of GRC - Postulate 4: The Wall of Sound

I have spent that last few weeks wandering through my “Groove Theory of GRC” and am reaching my last postulate. GRC is a groove that underpins the business to optimize decisions and provides the “safety” net that allows the business to grow, mature a...

The Groove Theory of GRC and its Postulates

Many moons ago, in a galaxy far far away, a theory emerged that would challenge the very existence of the universe. Okay, I may be a little dramatic here. It was actually in 2009, in Overland Park, KS and involved a two part blog series I wrote for S...

Business Continuity Awareness Week: March 18-22

Did you know that Business Continuity Awareness Week 2013 takes place March 18–22, 2013? The theme this year is ‘Business Continuity for the risks you can see and the ones you can’t.’ The theme announcement was made by the Business Continuity Institu...

New RSA Archer BCM Solution Announced!

What a week it's been! We met with Gartner analysts Roberta Witty and John Morency to present the updates to our RSA Archer Business Continuity Management & Operations (BCM&O) solution for their 2013 BCM Magic Quadrant study, announced the new soluti...

Next Generation Security Operations: Part 1

Over the past few weeks, I have been watching some interesting articles trickle across my screen as I peruse industry news. Dark Reading has been posting recaps of significant security attacks and breaches from 2012 as they review the year. Each one ...

The Space Between the 1s and 0s Redux

A few months ago, I wrote a short blog series using the “space between the 1s and 0s” as a metaphor to discuss dimensions of data that are beyond just the digits sitting on the disk drive. These dimensions included how the data was created, who creat...