Content Vault : Recommended Content
Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by,

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(3) (3)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Who’s Liable After a Data Breach?

Blog-post by,
ThuPham

After a data breach undergoes investigation, the unraveling of the mess afterwards can take months, or even years, to resolve. In addition to incurring costs of the requisite free identity monitoring services, as well as the costs of overhauling security in their IT infrastructure, a victim organization can face multiple class-action lawsuits.

(1) (1)

Business Issues, Technology, Big Data, Mobility, Security

A new style of CIO at the helm of the National Football League

The Super Bowl of Enterprise IT at the NFL

Blog-post by,
HP Blogger
,

A video rolls during the luncheon on the first day of the Tech Data Channel Link conference, and I see little Sam Gordon narrating her experiences playing football, a male dominated sport.

(1) (1)

CIO Leadership, Technology, Applications, Cloud, Security

Looking for innovative, daring and successful cloud implementations

That's our #CIOchat topic, Thursday, 2-3 p.m. ET.

Blog-post by,
Community Manager
,

Our chat topic this week will explore innovative, daring and/or successful cloud implementations. It's time to talk about actual examples.

(1)
   
(2) (2)

Technology, Applications, Mobility, Security

Wearables fashion v. function: depends on who's buying.

#CIOchat reveals substantial interest from CIO in wearables.

Blog-post by,
Community Manager
,

Our Twitter #CIOchat this week tackled wearable devices: fashion versus function? The consensus was it depends on the market, but that fashion is very important in most cases. 

We also explored IT and security implications of smart watches and more broadly, wearable devices. But first the numbers: 28 participants (a half dozen CIOs) cranked out 282 Tweets in our hour long #CIOchat.

(1) (1)

CIO Leadership, Security

The paradox of secured access to data that matters

Balancing the security posture for your enterprise

Blog-post by,
HP Blogger
,

Recently, I encrypted my device based upon a recommended precautionary procedure.  However, I later learned that this was only meant for a select set of devices.  Of course, my device was not one of them!

(1)
   
(1) (1)

Technology, Applications, Mobility, Security

Fashion first, function second in smart watches, wearables

We #CIOchat about this at 2-3 p.m. ET, Thursday.

Blog-post by,
Community Manager
,

It's simple. Most people won't don a smart watch or wearble device that's ugly. Consumers will not buy the new Apple Watch or forthcoming HP Luxury Smartwatch unless they are sharp and fashionable.

Our weekly #CIOchat will center on this fun question: Is fashion as important as function with smart watches and wearable devices? We chat 2-3 p.m. ET on Thursday, hashtag #CIOchat .

(2) (2)

Business Issues, Applications, Mobility, Security

Imperfect Security: something will always get through

The weak link is employees.

Blog-post by,
Community Manager
,

Our #CIOchat yesterday looked at security through the lens of recent credit card hacks via payment systems.

First the numbers: 23 participants spewing out 333 Tweets! We chat every Thursday 2-3 p.m. p.m. ET, hashtag #CIOchat . 

All agreed that no security is foolproof and that something is going to get through. Several did not envy being a retail CIO given these high profile hacks at Target, Home Depot and most assuredly others.

What's more, employees are the point of the most vulnerability to cyber attacks.

(3)
   
(2) (2)