Content Vault : Security | Recommended Content
Business Issues, Technology, Cloud, Security

16 Tips for Moving Your Workloads to the Cloud

Blog-post by,

By David Spark

Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t.

To avoid the complexity and cost, we recommend heeding the following advice. It’s but a fraction of the endless recommendations we received from cloud experts who offered well-seasoned tips on what to do and not do when you begin planning to move workloads to the cloud.

(1)
   
(4) (4)

Business Issues, CIO Leadership, Technology, Security

Insider Threat - Who Cares?

Blog-post by,

Written by Neil Bryden and Dan Schulte, Security Strategists Hewlett Packard

Insider Threat – Who Cares?

(1)
   
(2) (2)

Business Issues, Security

What’s the deal with Shadow IT?

Blog-post by,

Shadow IT is a term that describes IT systems and solutions built and used inside organizations without IT approval. A group of people choosing to use a spreadsheet that they email back and forth instead of a company-approved means of storing and sharing crucial information, employees using DropBox to share notes and files, a developer who builds an unsanctioned custom piece of software to simplify or automate a repetitive task — all these are examples of shadow IT.

(1)
   
(2) (2)

CIO Leadership, Applications, Mobility, Security

"Shadow IT just is"

Shadow IT #CIOchat recap

Blog-post by,
Community Manager
,
jdodge

Last week, we tackled shadow IT in the #CIOchat and everyone agreed it's not going away anytime soon. This was the topic for our #CIOchat hour, which is every Thursday 2-3 p.m. ET.

If participation is any indication, shadow IT is of big interest to CIOs and IT personnel. We broke all records for participation and Tweets, 61 and 404 respectively! That's a lot of Tweets to wade through to find patterns and trends. So I took a different tack with this week's #CIOchat .

(1)
   
(1) (1)

CIO Leadership, Security

Converged security: When departments collaborate, everyone wins

Operations and security must work together to break down silos, while the CIO/CISO cracks the whip

Blog-post by,
Gerben Verstraete

Rather than bother with a simple denial of service attack, today’s cybercriminals are most likely to go after your intellectual property and enterprise data. You can’t battle the current crop of bad guys with yesterday’s static policy-based frameworks — instead, you must actively safeguard data and search for threats.

(1)
   
(3) (3)

CIO Leadership, Technology, Applications, Security

Launching a Software Security Assurance Program - What does it take?

Blog-post by,
HP Blogger
,

It continues to surprise me when speaking to firms that have otherwise mature information security programs but haven’t stood up a software security assurance function within their organizations. This is especially surprising given the prevalence of attacks exploiting application security weaknesses. Granted, funding is required and establishing a capability is not easy to do.

(3)
   
(2) (2)

CIO Leadership, Big Data, Cloud, Security

Big Data critical to remaining competitive

We chat about analytics and Big Data 2-3 p.m. ET Thursday.

Blog-post by,
Community Manager
,
jdodge

Is Big Data catching on or does confusion and entropy remain its biggest challenges? Could it be both in that companies recognize the "urgency" to fully exploit analytics and Big Data, but have yet to get their acts together.

That will be our #CIOchat question this week: Is Big Data catching on or is it moving too slow? We chat 2-3 pm ET Thursday, hashtag #CIOchat .

(1)
   
(1) (1)

Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by,

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(2)
   
(4) (4)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)