Content Vault : Security | Recommended Content
CIO Leadership, Big Data, Cloud, Security

Big Data critical to remaining competitive

We chat about analytics and Big Data 2-3 p.m. ET Thursday.

Blog-post by,
Community Manager
,
jdodge

Is Big Data catching on or does confusion and entropy remain its biggest challenges? Could it be both in that companies recognize the "urgency" to fully exploit analytics and Big Data, but have yet to get their acts together.

That will be our #CIOchat question this week: Is Big Data catching on or is it moving too slow? We chat 2-3 pm ET Thursday, hashtag #CIOchat .

(1) (1)

Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by,

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(2)
   
(4) (4)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Who’s Liable After a Data Breach?

Blog-post by,
ThuPham

After a data breach undergoes investigation, the unraveling of the mess afterwards can take months, or even years, to resolve. In addition to incurring costs of the requisite free identity monitoring services, as well as the costs of overhauling security in their IT infrastructure, a victim organization can face multiple class-action lawsuits.

(1) (1)

Business Issues, Technology, Big Data, Mobility, Security

A new style of CIO at the helm of the National Football League

The Super Bowl of Enterprise IT at the NFL

Blog-post by,
HP Blogger
,

A video rolls during the luncheon on the first day of the Tech Data Channel Link conference, and I see little Sam Gordon narrating her experiences playing football, a male dominated sport.

(1) (1)

CIO Leadership, Technology, Applications, Cloud, Security

Looking for innovative, daring and successful cloud implementations

That's our #CIOchat topic, Thursday, 2-3 p.m. ET.

Blog-post by,
Community Manager
,

Our chat topic this week will explore innovative, daring and/or successful cloud implementations. It's time to talk about actual examples.

(3)
   
(2) (2)

Technology, Applications, Mobility, Security

Wearables fashion v. function: depends on who's buying.

#CIOchat reveals substantial interest from CIO in wearables.

Blog-post by,
Community Manager
,

Our Twitter #CIOchat this week tackled wearable devices: fashion versus function? The consensus was it depends on the market, but that fashion is very important in most cases. 

We also explored IT and security implications of smart watches and more broadly, wearable devices. But first the numbers: 28 participants (a half dozen CIOs) cranked out 282 Tweets in our hour long #CIOchat.

(5)
   
(1) (1)

CIO Leadership, Security

The paradox of secured access to data that matters

Balancing the security posture for your enterprise

Blog-post by,
HP Blogger
,

Recently, I encrypted my device based upon a recommended precautionary procedure.  However, I later learned that this was only meant for a select set of devices.  Of course, my device was not one of them!

(1)
   
(1) (1)

Technology, Applications, Mobility, Security

Fashion first, function second in smart watches, wearables

We #CIOchat about this at 2-3 p.m. ET, Thursday.

Blog-post by,
Community Manager
,

It's simple. Most people won't don a smart watch or wearble device that's ugly. Consumers will not buy the new Apple Watch or forthcoming HP Luxury Smartwatch unless they are sharp and fashionable.

Our weekly #CIOchat will center on this fun question: Is fashion as important as function with smart watches and wearable devices? We chat 2-3 p.m. ET on Thursday, hashtag #CIOchat .

(2)
   
(2) (2)