Enterprise security content on Enterprise CIO Forum

Business Issues, CIO Leadership, Technology, Big Data, Cloud, Mobility, Security

Information Runs Through It: Cohesive Cybersecurity Practices Will Strengthen the Enterprise

Blog-post by,

The rapid evolution of technology, in combination with global economic upheaval over the past few years, has caused a massive shift in the information security landscape. As a result, businesses are finding that they have even more limited resources than ever before which must be prioritized to areas of greatest need or return. The task of determining priorities is difficult in itself; the imperative is delivering more for less, both in terms of new investment and existing resources.


Technology, Security

Unless you build in security, your apps will be half-baked

Enterprise security authority Gary McGraw charts the growth of app security and why, even in the mobile/cloud age, it isn’t baked in from the start

Blog-post by,
Alec Wagner

Well over a decade ago, Gary McGraw and co-author John Viega penned a book with a simple premise: build software that includes security from the get-go, rather than stove-piping it on after the fact. Now, a dozen years “Building Secure Software: How to Avoid Security Problems the Right Way” was released, McGraw notes there’s been notable progress made—yet not enough.

CIO Leadership, Security

CIOs must secure their relationship with the CISOs

Are CIOs posing the right questions to the CISOs?

Blog-post by,
HP Blogger

CIO's are Chief Officers for Information. This means end-to-end responsibility and accountability for the collection, analysis and dissemination of the most valuable asset in the enterprise — information. While accuracy and timely delivery of the information is important, securing the information that matters is vital.

(5) (5)

Business Issues, Security

Rethinking enterprise security with HP chief security evangelist Rafal Los

Community Video by,
Community Manager

One of the biggest opportunities for enterprise companies to improve security is by integrating security more closely with the greater organization. For instance, knowing that a computer that's actively connecting to application resources is owned by someone on vacation may signal a potential security breach. Instead of pretending that security is impenetrable, organizations need to accept that a breach is possible and create an environment designed to result in the longest response time reasonable.

Business Issues, CIO Leadership, Technology, Security

5 Benefits of Proper IT Security Governance

Blog-post by,

In today’s economic, political, and social environment, customers are demanding the security of their information, as the concern about privacy and identity theft rises. Business partners, suppliers, and vendors are requiring security from one another, especially when they provide mutual network and information access. National and international regulators are asking enterprises to prove that they obey privacy laws and implement high-security measures.

(2) (2)

Technology, Security

Hiring information security talent a challenge

Finding right infosec talent key

Blog-post by,

CISOs know that hiring good talent is getting more difficult than ever.  Finding people who are both qualified and willing to work for you under your corporate rules is starting to become one of those tasks you outsource because you can't do it yourself.  Some will tell you that the reason for this is the climate of increasingly high risk, but I think there are actually two things going on here we need to take a hard look at.

The lack of technical talent

(3) (3)

Business Issues, Technology, Security

CISO's need "solid technology foundation, business perspective"

Contributed Video by,
Community Manager

"Users in the end are critical of the whole risk and security situation," says HP's chief information security officer Rich Armour. He offers insight about how HP approaches information security at a very high level as well from a tactical perspective.     

Syndicate content