When there’s a major systems outage or performance issue, IT teams come to the rescue to restore services as quickly as possible. Some IT organizations follow IT service management (ITSM) incident ...
The supposed need to address the "root causes" of every problem rather than the immediate crisis is a carefully calculated misdirection. So, three obvious causes of our illegal immigration crisis. But ...
One of the biggest changes in the 2020 FCPA Resource Guide, 2nd edition, is the addition of a new Hallmark, entitled, Investigation, Analysis, and Remediation of Misconduct, which reads in full: The ...
Do you play pool? I sure don’t. But I know enough about the game to use it as a metaphor for the hidden reasons we don’t do what we say we will. The object is to get balls into pockets using a big ...
Casey Means says Americans share a single underlying condition.
The problem with cybersecurity is that cyber risks are far too plentiful. Trojans, spyware, backdoors, adware, ransomware, viruses and malware, physical theft, social engineering, remote employees, ...
Editor’s note: This article is the second in a series to help practitioners learn about the AICPA’s new quality management standards and prepare to implement them. The interrelated final standards on ...
Few scholars influenced American government in the twentieth century more profoundly than James Q. Wilson. Presidents consulted him for his expertise on everything from crime to drug abuse to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results