Content Vault : Security | Recommended Content
Technology, Applications, Mobility, Security

Wearables fashion v. function: depends on who's buying.

#CIOchat reveals substantial interest from CIO in wearables.

Blog-post by,
Community Manager
,

Our Twitter #CIOchat this week tackled wearable devices: fashion versus function? The consensus was it depends on the market, but that fashion is very important in most cases. 

We also explored IT and security implications of smart watches and more broadly, wearable devices. But first the numbers: 28 participants (a half dozen CIOs) cranked out 282 Tweets in our hour long #CIOchat.


CIO Leadership, Security

The paradox of secured access to data that matters

Balancing the security posture for your enterprise

Blog-post by,
HP Blogger
,

Recently, I encrypted my device based upon a recommended precautionary procedure.  However, I later learned that this was only meant for a select set of devices.  Of course, my device was not one of them!


Technology, Applications, Mobility, Security

Fashion first, function second in smart watches, wearables

We #CIOchat about this at 2-3 p.m. ET, Thursday.

Blog-post by,
Community Manager
,

It's simple. Most people won't don a smart watch or wearble device that's ugly. Consumers will not buy the new Apple Watch or forthcoming HP Luxury Smartwatch unless they are sharp and fashionable.

Our weekly #CIOchat will center on this fun question: Is fashion as important as function with smart watches and wearable devices? We chat 2-3 p.m. ET on Thursday, hashtag #CIOchat .

(2) (2)

Business Issues, Applications, Mobility, Security

Imperfect Security: something will always get through

The weak link is employees.

Blog-post by,
Community Manager
,

Our #CIOchat yesterday looked at security through the lens of recent credit card hacks via payment systems.

First the numbers: 23 participants spewing out 333 Tweets! We chat every Thursday 2-3 p.m. p.m. ET, hashtag #CIOchat . 

All agreed that no security is foolproof and that something is going to get through. Several did not envy being a retail CIO given these high profile hacks at Target, Home Depot and most assuredly others.

What's more, employees are the point of the most vulnerability to cyber attacks.

(2) (2)

Business Issues, Mobility, Security

Mobile access to the enterprise essential

CIO must evaluate security implications.

Blog-post by,
Community Manager
,

Yesterday's Twitter chat focused on the balancing act between mobile access and security. Most agree that mobile workers must be given acccess to perform their jobs. Others weighed mobile access in terms of business value: if there's value in access, it must be given. 

With that in mind, the Tweets of the week came from CIO Wilfredo Lasalle (@wlassalle). There's two: 

"The attention to BYOD mattered when it was wanted by the users/business. Now the CIO needs to manage its security implications."

(2) (2)

Business Issues, CIO Leadership, Security

The healthcare industry needs a new security prescription

What recent high profile PHI data breaches can teach other industries

Blog-post by,

It’s not just hospital gowns that are exposing things best left private – it’s also data breaches.

(1)
   
(3) (3)

Business Issues, CIO Leadership, Technology, Cloud, IT Performance, Security

Disaster Recovery: Key Takeaways for the CIO

Blog-post by,
SteveLyerly

Discussion about an IT disaster isn't if but when — yet 70 percent of companies have only snapshot-based disaster recovery (DR) solutions in place. More disturbing is the fact that as of last July, 7 percent of all businesses surveyed had no DR solution.

(2) (2)

CIO Leadership, Security

In devices we trust – or should it be Apps?

Protect your Apps – no matter what device they run on

Blog-post by,
HP Blogger
,

“If you're been secretly watering your lawn at night during a drought emergency, then even the data on the sprinkler controller can land you in hot water if it ends up in the wrong hands,” says Maria Bledsoe, Senior Manager of HP Fortify, in this Information Week article.

(1) (1)

Business Issues, Technology, Cloud, Converged Infrastructure, Security

A five step journey to the cloud

Do not rush your cloud implementation.

Blog-post by,
HP Blogger
,

While getting into the cloud fast can seem attractive, a deliberate step-by-step approach is the wisest course. Rushing to the cloud without considering all its implications is not a good idea. So here are five steps to consider as you evaluate cloud options.  

Step 1: Standardize and Consolidate

(3) (3)

Business Issues, Technology, Mobility, Security

5 Ways Employees Create Security Risks for Businesses

Blog-post by,

The Target, Inc. data hack, the Heartbleed Bug---these and other security breaches serve as stark reminders for businesses of the very real risks of doing business in a web-connected world. On the upside, these high-profile hacks reinforce the dangers of cyber-attacks from without. But on the downside, they tend to distract organizations from focusing on mounting security risks caused by their own employees from within.

(6)
   
(1) (1)