Content Vault : Security | Recommended Content
Business Issues, Cloud, Security

Evolution of a #CIOchat cloud question

Watch the video!

Blog-post by John Dodge,
Community Manager
, Mon, 04/06/2015 - 16:13

My longtime friend and colleague Charlie Cooper (@coopeydoop) suggested the following #CIOchat question a few weeks ago: "How long before CIOs lose their fears about the security in moving their data to the cloud?"

It's a good question, but I anticipated many of the CIOs in our weekly #CIOchat would respond that no one in the enterprise should ever lose their fears about security. The inference of the question as constructed is that adopting the cloud outweighs security concerns.

(1) (1)

CIO Leadership, Security

Executive Priorities – Balancing Security and Usability

Blog-post by Rafal Los, Tue, 04/07/2015 - 01:21
Wh1t3Rabbit

Cross-posted from my regular contributed column on Norse Security's Dark Matters.

(1)
   

Business Issues, Big Data, Cloud, Security

Wanted: Permanent and empowered CIO to clean up Library of Congress IT

World's largest library adds 12,000 new items every day.

Blog-post by John Dodge,
Community Manager
, Thu, 04/02/2015 - 15:57

Weaknesses in security, strategic planning, its IT investments, service management and perhaps most critically, leadership, has prompted the General Account Office to urge to Library of Congress to appoint permanent CIO pronto.

The stinging 133-page report from the GAO was released two days ago. So what's the problem?

(2)
   
(2) (2)

Technology, Big Data, Security

Big Data: Trust No One

A Big Data Take on the Zero Trust Model

Blog-post by jamal khawaja, Tue, 03/31/2015 - 16:32

What do Home Depot, JP Morgan Chase, Sony, Apple, Ebay, PF Chang’s, and Domino’s Pizza have in common? 

In three words: pwned by hackers.

(2)
   
(4) (4)

Technology, IT Infrastructure, Security

Four steps: The CIO’s guide to infrastructure cyber security

Blog-post by Gene De Libero, Sun, 03/15/2015 - 00:27

Cybersecurity is the number one concern for CIOs in state security for 2015 – and no wonder. State security systems house an enormous amount of data on any number of people, organizations, and even infrastructures – but keeping your organization’s data safe is just as important.

(5)
   
(1) (1)

CIO Leadership, Technology, Security

Protecting Source Code and Other IP with Behavioral Analytics

Blog-post by Stephan Jou, Mon, 03/09/2015 - 15:16

Nothing shakes the worlds of those in charge of businesses, engineering teams or information technology more than an attack on their intellectual property (IP): the source code, product designs, formulae, process engineering documents and related assets that are a company's most valuable IP.

(4)
   
(2) (2)

Business Issues, Security

Is sharing cyber security information with the Feds a good idea?

#CIOchat explores this explosive issue Thursday, 2-3 p.m. ET.

Blog-post by John Dodge,
Community Manager
, Mon, 02/23/2015 - 20:41

President Obama made an impassioned plea at the Feb. 13 Cyber Security Summit for the private sector and the federal government to exchange cyber threat information. The idea is simple: teaming up is better than separately waging the war against cyber terrorism, spying and crime.

(6)
   
(1) (1)

Business Issues, Technology, Cloud, Security

A frightening lack of IoT Security

With 50 microprocessors or more, cars could be targeted by bad actors.

Blog-post by HP Security Strategists, Fri, 02/20/2015 - 17:24

By HP Security Strategist Stan Wisseman

(1)
   

CIO Leadership, Technology, Security

Fending off targeted cyberattacks with ATA

Blog-post by HP Security Strategists, Tue, 02/03/2015 - 21:41

By HP security strategist Stan Wisseman

Unlike computer worms and viruses that usually attack indiscriminately, targeted cyberattacks involve intelligent planning with respect to the chosen target or class of targets. Also evident in these attacks, is a difference in attitude: the threat agent wants to attack the victim and is willing to expend the extra effort to target them as an individual (or group).

(3)
   
(1) (1)

CIO Leadership, Security

Are CIOs losing control?

Blog-post by John Dodge,
Community Manager
, Fri, 01/30/2015 - 17:42

The top three things that keep CIOs awake at night are security breaches, downtime and talent acquisition in that order, according to a survey by Sungard Availability Services.

Are CIOs losing control of IT?

(7)
   
(1) (1)