Enterprise security content on Enterprise CIO Forum

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Performance, Mobility, Security, Services

Security in 2015: The Enterprise Begins to Favor Integrated Cloud Services vs. On-Premise Point Solutions

Blog-post by,
PaulLipman

Today’s Chief Information Security Officer (CISO) is faced with an over-load of point products (NAC, IDS, IPS, Endpoint Security, Web Gateway, Next Generation Firewall and APT to name just a few) provided by a plethora of vendors. These products are typically deployed in some on-premise configuration and tend to be difficult, if not impossible, to integrate together – resulting in severe visibility limitations across the organization’s security posture.

(1)
   
(1) (1)

Business Issues, CIO Leadership, Security

Six 'Spooky' Cyber Security Statistics

From the average cost per company lost, to the number of cyber security victims per day.

Blog-post by,

It’s Halloween, and the end of National Cyber Security Awareness Month (NCSAM). And we here at IDG and the Enterprise CIO Forum would like to end October leaving you with six ‘spooky’ cyber security statistics.

Take a look below.

(3)
   
(1) (1)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)

CIO Leadership, Security

The paradox of secured access to data that matters

Balancing the security posture for your enterprise

Blog-post by,
HP Blogger
,

Recently, I encrypted my device based upon a recommended precautionary procedure.  However, I later learned that this was only meant for a select set of devices.  Of course, my device was not one of them!

(1)
   
(1) (1)

CIO Leadership, Security

In devices we trust – or should it be Apps?

Protect your Apps – no matter what device they run on

Blog-post by,
HP Blogger
,

“If you're been secretly watering your lawn at night during a drought emergency, then even the data on the sprinkler controller can land you in hot water if it ends up in the wrong hands,” says Maria Bledsoe, Senior Manager of HP Fortify, in this Information Week article.

(1) (1)

Business Issues, CIO Leadership, Technology, Big Data, Cloud, Mobility, Security

Information Runs Through It: Cohesive Cybersecurity Practices Will Strengthen the Enterprise

Blog-post by,
SteveDurbin

The rapid evolution of technology, in combination with global economic upheaval over the past few years, has caused a massive shift in the information security landscape. As a result, businesses are finding that they have even more limited resources than ever before which must be prioritized to areas of greatest need or return. The task of determining priorities is difficult in itself; the imperative is delivering more for less, both in terms of new investment and existing resources.

 


Technology, Security

Unless you build in security, your apps will be half-baked

Enterprise security authority Gary McGraw charts the growth of app security and why, even in the mobile/cloud age, it isn’t baked in from the start

Blog-post by,
Alec Wagner

Well over a decade ago, Gary McGraw and co-author John Viega penned a book with a simple premise: build software that includes security from the get-go, rather than stove-piping it on after the fact. Now, a dozen years “Building Secure Software: How to Avoid Security Problems the Right Way” was released, McGraw notes there’s been notable progress made—yet not enough.


CIO Leadership, Security

CIOs must secure their relationship with the CISOs

Are CIOs posing the right questions to the CISOs?

Blog-post by,
HP Blogger
,

CIO's are Chief Officers for Information. This means end-to-end responsibility and accountability for the collection, analysis and dissemination of the most valuable asset in the enterprise — information. While accuracy and timely delivery of the information is important, securing the information that matters is vital.

(5) (5)

Syndicate content