Content Vault : Security | Recommended Content
CIO Leadership, Security

Converged security: When departments collaborate, everyone wins

Operations and security must work together to break down silos, while the CIO/CISO cracks the whip

Blog-post by,
Gerben Verstraete

Rather than bother with a simple denial of service attack, today’s cybercriminals are most likely to go after your intellectual property and enterprise data. You can’t battle the current crop of bad guys with yesterday’s static policy-based frameworks — instead, you must actively safeguard data and search for threats.

(1) (1)

CIO Leadership, Technology, Applications, Security

Launching a Software Security Assurance Program - What does it take?

Blog-post by,
HP Blogger
,

It continues to surprise me when speaking to firms that have otherwise mature information security programs but haven’t stood up a software security assurance function within their organizations. This is especially surprising given the prevalence of attacks exploiting application security weaknesses. Granted, funding is required and establishing a capability is not easy to do.

(2)
   
(2) (2)

CIO Leadership, Big Data, Cloud, Security

Big Data critical to remaining competitive

We chat about analytics and Big Data 2-3 p.m. ET Thursday.

Blog-post by,
Community Manager
,
jdodge

Is Big Data catching on or does confusion and entropy remain its biggest challenges? Could it be both in that companies recognize the "urgency" to fully exploit analytics and Big Data, but have yet to get their acts together.

That will be our #CIOchat question this week: Is Big Data catching on or is it moving too slow? We chat 2-3 pm ET Thursday, hashtag #CIOchat .

(1)
   
(1) (1)

Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by,

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(2)
   
(4) (4)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Who’s Liable After a Data Breach?

Blog-post by,
ThuPham

After a data breach undergoes investigation, the unraveling of the mess afterwards can take months, or even years, to resolve. In addition to incurring costs of the requisite free identity monitoring services, as well as the costs of overhauling security in their IT infrastructure, a victim organization can face multiple class-action lawsuits.

(1) (1)

Business Issues, Technology, Big Data, Mobility, Security

A new style of CIO at the helm of the National Football League

The Super Bowl of Enterprise IT at the NFL

Blog-post by,
HP Blogger
,

A video rolls during the luncheon on the first day of the Tech Data Channel Link conference, and I see little Sam Gordon narrating her experiences playing football, a male dominated sport.

(1) (1)

CIO Leadership, Technology, Applications, Cloud, Security

Looking for innovative, daring and successful cloud implementations

That's our #CIOchat topic, Thursday, 2-3 p.m. ET.

Blog-post by,
Community Manager
,

Our chat topic this week will explore innovative, daring and/or successful cloud implementations. It's time to talk about actual examples.

(6)
   
(2) (2)

Technology, Applications, Mobility, Security

Wearables fashion v. function: depends on who's buying.

#CIOchat reveals substantial interest from CIO in wearables.

Blog-post by,
Community Manager
,

Our Twitter #CIOchat this week tackled wearable devices: fashion versus function? The consensus was it depends on the market, but that fashion is very important in most cases. 

We also explored IT and security implications of smart watches and more broadly, wearable devices. But first the numbers: 28 participants (a half dozen CIOs) cranked out 282 Tweets in our hour long #CIOchat.

(5)
   
(1) (1)