Content Vault : Security | Recommended Content
Business Issues, Security

"Threat Horizon 2017" outlines systemic risks and threats

Blog-post by John Dodge,
Community Manager
, Mon, 03/23/2015 - 15:11

The Threat Horizon 2017 is out from the Information Security Forum (ISF) and it's not pretty. Of course not. You knew it wouldn't be. 

(4)
   

Technology, IT Infrastructure, Security

Four steps: The CIO’s guide to infrastructure cyber security

Blog-post by Gene De Libero, Sun, 03/15/2015 - 00:27

Cybersecurity is the number one concern for CIOs in state security for 2015 – and no wonder. State security systems house an enormous amount of data on any number of people, organizations, and even infrastructures – but keeping your organization’s data safe is just as important.

(5)
   
(1) (1)

CIO Leadership, Technology, Security

Protecting Source Code and Other IP with Behavioral Analytics

Blog-post by Stephan Jou, Mon, 03/09/2015 - 15:16

Nothing shakes the worlds of those in charge of businesses, engineering teams or information technology more than an attack on their intellectual property (IP): the source code, product designs, formulae, process engineering documents and related assets that are a company's most valuable IP.

(4)
   
(2) (2)

Business Issues, Security

Is sharing cyber security information with the Feds a good idea?

#CIOchat explores this explosive issue Thursday, 2-3 p.m. ET.

Blog-post by John Dodge,
Community Manager
, Mon, 02/23/2015 - 20:41

President Obama made an impassioned plea at the Feb. 13 Cyber Security Summit for the private sector and the federal government to exchange cyber threat information. The idea is simple: teaming up is better than separately waging the war against cyber terrorism, spying and crime.

(6)
   
(1) (1)

Business Issues, Technology, Cloud, Security

A frightening lack of IoT Security

With 50 microprocessors or more, cars could be targeted by bad actors.

Blog-post by HP Security Strategists, Fri, 02/20/2015 - 17:24

By HP Security Strategist Stan Wisseman

(1)
   

CIO Leadership, Technology, Security

Fending off targeted cyberattacks with ATA

Blog-post by HP Security Strategists, Tue, 02/03/2015 - 21:41

By HP security strategist Stan Wisseman

Unlike computer worms and viruses that usually attack indiscriminately, targeted cyberattacks involve intelligent planning with respect to the chosen target or class of targets. Also evident in these attacks, is a difference in attitude: the threat agent wants to attack the victim and is willing to expend the extra effort to target them as an individual (or group).

(3)
   
(1) (1)

CIO Leadership, Security

Are CIOs losing control?

Blog-post by John Dodge,
Community Manager
, Fri, 01/30/2015 - 17:42

The top three things that keep CIOs awake at night are security breaches, downtime and talent acquisition in that order, according to a survey by Sungard Availability Services.

Are CIOs losing control of IT?

(7)
   
(1) (1)

Business Issues, Security

Technology risk assessment #CIOchat this week

They do it for blizzards and the Super Bowl.

Blog-post by John Dodge,
Community Manager
, Wed, 01/28/2015 - 14:44

How do you assess technology risk? When do you assess it? There's plenty of methodologies that do this and I've linked to a several documents below, one a risk assessment toolkit authored by the State of California CIO Michele Robinson and another NIST guidelines for assessing technology risk.

(3)
   
(2) (2)

Business Issues, Security

Is Sony the cyber security game changer?

Stars align for passage of key cyber security legislation.

Blog-post by John Dodge,
Community Manager
, Fri, 01/16/2015 - 15:53

CIO has a spot-on commentary describing how cyber criminals are closely watching how the U.S. will respond to the Sony hack. Indeed, I wrote a couple of days ago about the President and Congress promising to come together on cyber security legislation that, among other things, aims to forge a stronger relationship between government and the private sector for exchanging threat information.

(6)
   
(2) (2)