Content Vault : Security | Recommended Content
Technology, Security

Endpoint Security Lessons from the IRS Breach

Blog-post by Dan Ross, Wed, 06/24/2015 - 17:33
DanRoss

In the latest national security breach, identity thieves breached the IRS and gained access to the financial information of over 100,000 taxpayers. The cyber criminals also tried to gain access to 100,000 more taxpayer accounts, but were unsuccessful in their attempts. Security experts suspect that they had access to previously stolen information, including Social Security numbers.


Business Issues, Cloud, Security

Are cloud security fears overblown?

#CIOchat topic 2-3 p.m. ET Thursday

Blog-post by John Dodge,
Community Manager
, Mon, 06/15/2015 - 15:45

Are fears about cloud security warranted or overblown? That is our #CIOchat question for this Thursday #CIOchat from 2-3 p.m. ET and comes from ECF editorial director Bill Laberis.

To put this in perspective, one could argue you can never exagerrate security fears. Vigilance is paramount, but is the cloud unfairly singled out as a security risk versus other ways of storing and managing information?

(1)
   
(1) (1)

Business Issues, CIO Leadership, Technology, Security

Bigger than BAD (Basic attacks that will destroy)

Blog-post by HP Security Strategists, Fri, 06/12/2015 - 13:05

By HP Security Strategist Dan Schulte

BAD (Basic Attacks that will Destroy) is a new term I discovered at Showmecon this week in St. Louis.  A great conference with opportunities to visit old friends, network and hear stories from the attacker’s point of view.  There was one talk that stood out to me on Monday. An excellent presentation with great stories, with the message: we should abandon all of this APT and Advanced Threat Talk to focus solely on ‘Low Hanging Fruit’ or ‘BAD’ (in this case, social engineering). 

(1) (1)

Business Issues, CIO Leadership, Technology, Big Data, Cloud, IT Infrastructure, Mobility, Security

Extending Information Risk Management to Embrace Cyber Resilience

Blog-post by Steve Durbin, Tue, 06/02/2015 - 21:15
SteveDurbin

Global cyber-attacks continue to become more innovative and sophisticated than ever before. Data breaches at major retail brands have revealed that cyber risk is an ever-growing concern for organizations around the world. In today’s cyber age, a company’s reputation – and the trust dynamic that exists amongst suppliers, customers and partners – has become a target for cybercriminals and hacktivists.

(1) (1)

CIO Leadership, Security

Top 5 ways to immediately improve your security program

Blog-post by HP Security Strategists, Fri, 05/29/2015 - 16:54

By HP Security Strategist Stan Wisseman


Business Issues, CIO Leadership, Technology, Big Data, Cloud, IT Infrastructure, Mobility, Security

Keeping up with Criminals: Reducing Cyber Security Cost and Complexity

Blog-post by Paul Lipman, Thu, 05/21/2015 - 17:02
PaulLipman

Remember the good old days, when cybercrime was mostly about mischievous programmers wreaking a little havoc? Those were simpler times indeed. Today, cybercrime has become a global phenomenon, fueled by big money bounties, intensifying political unrest, and organized mobsters hiding in the nether regions of the deep web. 


CIO Leadership, Security

Balancing Value, Costs, and Risk for an Effective Security Program

Blog-post by HP Security Strategists, Tue, 05/12/2015 - 22:29
HP Security Strategists

By HP Security Strategist Stan Wisseman

(1) (1)

Business Issues, Security

Breach response: How to prepare for the Inevitable

White Paper by John Dodge,
Community Manager

A comprehensive preparedness plan for security breaches is essential. No, critical. The average cost of cleaning up a security breach and the fallout has doubled since 2010 to an average of $12.7 million. And a breach can take up to 65.5 days to resolve.

The attached white paper describes in detail how to be ready when it happens if, indeed, a breach, occurs. Are you ready? Are you prepared? Is the right resolution team in place? 

 


Business Issues, CIO Leadership, Security

How CIOs build cred in the boardroom about security

#CIOchat 2-3 p.m. ET Thursday

Blog-post by John Dodge,
Community Manager
, Tue, 04/28/2015 - 15:18

How involved should corporate boards be with cyber security? How much information should the CIO or CISO provide to the board and how should they frame it? Is the board getting the right information and enough or it?

(3)
   
(1) (1)

Business Issues, Cloud, Security

Evolution of a #CIOchat cloud question

Watch the video!

Blog-post by John Dodge,
Community Manager
, Mon, 04/06/2015 - 16:13

My longtime friend and colleague Charlie Cooper (@coopeydoop) suggested the following #CIOchat question a few weeks ago: "How long before CIOs lose their fears about the security in moving their data to the cloud?"

It's a good question, but I anticipated many of the CIOs in our weekly #CIOchat would respond that no one in the enterprise should ever lose their fears about security. The inference of the question as constructed is that adopting the cloud outweighs security concerns.

(1) (1)