Content Vault : Security | Recommended Content
Business Issues, Technology, Big Data, Security

Data Security & Cyber Privacy: Circumstances Have Changed, and So Should IT

Blog-post by,
KPadir

Lately, it feels like data breaches are making headlines daily. The breaches at Target and Neiman-Marcus, for example, have raised a crescendo of concern that is certainly justified but sometimes a little off base. In particular, there’s confusion over the distinction between online privacy and online security. Some of the commentators have simply been echoing Sun CEO, Scott McNealy’s comments dating back to 1999, suggesting that we all just “get over it” and learn to live without online privacy.

(1)
   
(3) (3)

CIO Leadership, Security

We are all a Target - Operationalizing Enterprise Security

Blog-post by,
HP Blogger
,
Wh1t3Rabbit

You are correct in thinking this blog post title is a play on words. Indeed it is. I mean to say that yes indeed every enterprise is a target in the sense that they are targeted for a breach. I also mean that we, collectively, are all prone to the exact same alleged failure that caused the massive breach at Target.

(3) (3)

Technology, Security

The era of Critical Security Controls (CSC)

SAN 20 CSCs encourage best security practices

Blog-post by,
vijaybasani

As information technology drives automation, improves service delivery and provides direct, positive impacts to top line revenue, information security takes a percentage of that revenue away due to investments in securing sensitive customer and corporate data – often in the form of expensive technology investments, without the proper process and staff required implement and manage it.

(2) (2)

Technology, Cloud, Security

Cloud security fears overblown, but be wary of sloppy SaaS users

Two stories in the past 24 hours offer stark contrast about cloud security.

Blog-post by,
Community Manager
,
jdodge

 Are cloud security fears overblown or understated? I've found two CIO.com stories in the past 24 hours that say yes and yes.

A study from Softchoice says Software as a Service (SaaS) users are "irresponsible' when it comes to security. They're 2x to 10x more careless with passwords and 2x to 16x more casual with file transfers. I take that to mean x times more than non-cloud SaaS users.

(2) (2)

Business Issues, Technology, Applications, Big Data, Cloud, Converged Infrastructure, Security, Services

The front and center IT topics for 2014

Privacy, hybrid cloud, apps, services and several others will dominate CIO conversations

Blog-post by,
HP Blogger
,
Christian

It's that time again when I make my forecasts for the new year. Sometimes, my predictions work out, sometimes not. Here's 10 topics that will be front and center for CIOs in 2014. What do you think I overlooked? Anyway, here goes.

Privacy

(7) (7)

Business Issues, CIO Leadership, Security, Services

New types of cyber adversaries "coming on the scene"

HP Video by,
Community Manager
,

HP Enterprise security CTO Jacob West explains how cyber adversaries are broadening their reach and tool portfolio. The number of adversaries are "unlimited," explains West, who was interviewed at HP Discover in Barcelona. He also advises enterprises to "learn from the bad guys" through collaboration and offers several other security tips. 

(1)
   
(4) (4)

Business Issues, Security

Data security is up to all of us

Target incident shows that protecting information is not just up to IT.

Blog-post by,
Community Manager
,

I read the press release from Target this morning about the theft of potentially millions of credit card numbers. 

Ok, we can get all huffy about what Target knew and when. We can blame them for lax security. But theft of credit card numbers, expiration dates and security codes, happens. Last year, it was Barnes and Noble. As with Target, that was from their stores POS systems, too.

(1)
   
(3) (3)

CIO Leadership, Security

Why you’re paying such a high price for cybercrime

Larry Ponemon discusses the big spike in security spending—and suggests that CIOs who spend wisely today can avoid becoming a victim tomorrow.

Blog-post by,
Alec Wagner

Despite better technology and more knowledgeable leadership in enterprise security, the cost to defend our organizations against cyber crime just keeps going up. In the four years since IT research firm Ponemon Institute first released its annual “Cost of Cyber Crime Study,” the average annualized cost of cyber crime has increased 78 percent. And, according to chairman and founder Larry Ponemon, it won’t stop there.

(4) (4)

CIO Leadership, Big Data, Cloud, IT Performance, Security

High performance IT pays off

Avoiding the CIO "austerity trap"

Blog-post by,
Community Manager
,

CIOs who have managed to break their dependence on legacy systems and embrace the digital world drive more top line growth and streamline more processes than their peers. 

That's the conclusion of a new Accenture report "High IT performers: Defined by Digital."

(3)
   

Business Issues, Security

IT security pros troubled by changing threats, lack of collaboration

The CIO Quick Pulse survey reveals that security professionals are in a precarious position.

They are reacting to more sophisticated and challenging threats. Indeed, a survey of 76 security pros found that 64% are either "treading water or playing whack a mole."  This white paper also looks at internal threats and cultures that need to be educated about security.

The attached research brief also notes that security pros are as bad at collaborating as hackers are good. This needs to change. 

Check it out. 

(9) (9)