Content Vault : Recommended Content
CIO Leadership, Cloud, IT Performance, Security

Top five priorities for the CIO in 2015

Here's mine: Tell me yours here or in the #CIOchat Thursday, 2-3 p.m. ET.

Blog-post by,
Community Manager
,

What are the top five priorities for the CIO in the new year? That's our #CIOchat question for Thursday, 2-3 p.m. ET. 

I'll a stab at them and would love to hear back from CIOs. You can also respond at length in our new CIO Question. My five purposely avoided technologies except security because at this high level, they are obvious: cloud, Big Data, mobile, data centers etc.

(7)
   
(2) (2)

Business Issues, Security

Banks could make retailers pay for poor data and security governance

Federal judge rules in favor of banks.

Blog-post by,

A couple months ago, I reached out to a set of CIOs on the importance of good governance and security. All of them agreed that both were incredible important. However, one CIO retorted a very pointed remark by saying that “the IT leadership at these breached companies wasn’t stupid”. He continued by saying that when selling the rest of the C-Suite, the discussion needs to be about business outcomes and business benefits.  For this reason, he said that CIOs have struggled at selling the value of investments in governance and security investment.

(3)
   

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Performance, Mobility, Security, Services

Security in 2015: The Enterprise Begins to Favor Integrated Cloud Services vs. On-Premise Point Solutions

Blog-post by,
PaulLipman

Today’s Chief Information Security Officer (CISO) is faced with an over-load of point products (NAC, IDS, IPS, Endpoint Security, Web Gateway, Next Generation Firewall and APT to name just a few) provided by a plethora of vendors. These products are typically deployed in some on-premise configuration and tend to be difficult, if not impossible, to integrate together – resulting in severe visibility limitations across the organization’s security posture.

(1)
   
(1) (1)

Business Issues, Security

5 Information Security Trends That Will Dominate 2015

Cyber criminals "often use 21st century tools to take on 20th century systems."

Blog-post by,
Community Manager
,

This five trends this CIO.com article looks at are cybercrime, privacy and increasing regulation, vulnerabilities created by third party suppliers and partners, BYOx or bring your own anything or device (hellooooo, mobility); and how to educate people about the importance of good security practices.

(5)
   
(1) (1)

Technology, Cloud, Converged Infrastructure

Six Barriers To Cloud

Interest in the cloud is sky-high. You understand that “the cloud” can help your business become more agile, cost-effective, and innovative. In fact, your business is probably among the 81 percent of businesses that expect to deploy cloud architecture in the next five years, according to a Frost and Sullivan report at HP.com.

(8)
   
(7) (7)

CIO Leadership, Big Data

Making business sense out of the Internet of Things

Blog-post by,

Recently, I got to speak to a CIO at a Global 500 Company about the challenges of running his IT organization. He said that one of his biggest challenges is getting business leaders to understand technology better. “I want my business leaders to be asking for digital services that support and build upon their product and service offerings”. I think that his perspective provides real insight to how businesses should be thinking about the so called Internet of Things (IoT), but let me get you there first.

(4)
   
(2) (2)

Business Issues, Applications, Cloud, Converged Infrastructure, Services

Software-defined data centers take on critical importance

What is SDx and why do we need it? #CIOchat 2-3 p.m. ET Thursday

Blog-post by,
Community Manager
,
jdodge

Call it software-defined anything (SDx): infrastructure, servers, storage, data center and networks. Why do we need them? That's what we will explore in our #CIOchat this week from 2-3 p.m. ET Thursday.

Software-defined data centers (SDDC) promise to simplify their namesake and make them more agile and automated. The idea is to move away from an emphasis on hardware to a world based on software and open standards. SDDC and more broadly, SDx, trade inflexibility for agility and speed.

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Security

Critical Application Resiliency

Building cyber security into apps from the start.

Blog-post by,

by Stan Wisseman

 

As threat actors grow in sophistication and effectiveness (as we’ve seen with Sony Pictures this week), organizations must enhance their understanding of failure states and their potential impacts. While infrastructure and systems also need to be resilient, applications are taking the brunt of successful attacks. We need to take more proactive steps to ensure that applications can resist attack.

(4)
   
(1) (1)

Technology, Cloud

Sizing a cloud can be tricky

Look at CPU, RAM and vCPUs

Blog-post by,
Let’s discuss virtual CPU’s and their place in cloud environments.  How many CPUs and RAM does your application that is targeted for the Cloud currently use?

Cloud technology primarily leverages virtual computers.  Each of the virtual computers have a defined amount of compute power, represented as processors and RAM.

(3)
   
(1) (1)

Business Issues, Cloud

Dreaming your future mode of operations in the cloud

Blog-post by,
HP Blogger
,

How can you match up the promise of the cloud with the twin goals of reducing costs and enhancing customer responsiveness? From afar, it seems easy, but reality can be entiurely another matter. Here are a few pointers to help you accomplish your goals as you transition to the environment of the future.    

Start by developing your future target environment

(3)
   
(2) (2)