Enterprise security content on Enterprise CIO Forum


Researchers hack popular voting machine

Community Video by John Dodge,
Community Manager
, Wed, 09/28/2011 - 20:39

Researchers from the Argonne National Laboratory have shown how an electronically-savvy eighth grader using as little as $10 in parts could hack widely-used touchscreen voting machines.

A so-called "man-in the middle" attack detailed in the video above shows how today's digital version of the Watergate burlgars could compromise the 2012 presidential election. With the introduction of "alien electronics" into the voting machine, voter input can be changed in several ways. 

Business Issues, Technology, Applications

CIOs not fretting about cloud security

Pulse Article by John Dodge,
Community Manager
, Wed, 09/28/2011 - 18:36

You hear it over and over again – security is the biggest concern in moving to the cloud. Well, guess what? It’s not, according to five CIOs in the Enterprise CIO Forum Council. Find out what their biggest concerns are. The CIOs interviewed are Campbell Soup Co.

(3) (3)

Technology, Cloud

Security in the mobile device era

Leadership Video by Bill Laberis, Tue, 09/27/2011 - 19:10

CTOvision editor Bob Gourley sizes up the "mobile era" driven by smart phones, tablets and a massive underlying infrastructure.  The interviewer is Enterprise CIO Forum editorial director Bill Laberis.

Related Topics:

Managing security in the cloud

Aligning security with the enterprise

Protecting the Enterprise

Technology, Security

Big Data and enterprise CIOs

Leadership Video , Mon, 09/26/2011 - 15:34

Big data is all that 'stuff' -  much of it unstructured – that your organization needs to review and analyze but cannot due to shortcomings in the current infrastructure. Big data also has specific security implications, as this brief video will highlight. Enterprise CIO Forum editorial director Bill Laberis interviews CTOvision.com editor Bob Gourley.

For more on this topic, go to:

Managing security in the cloud

Technology, Mobility

Video: best practices for securing mobile devices

Community Video by John Dodge,
Community Manager
, Mon, 09/26/2011 - 14:44

Enterprise CIO Forum community manager John Dodge reviews Forrester Research's 20 best practices for managing and securing mobile devices.

Follow John Dodge on Twitter.

Technology, Cloud

What's your state doing about cyber crime?

Community Video by John Dodge,
Community Manager
, Thu, 09/22/2011 - 15:13

Enterprise CIO Forum community manager John Dodge discusses why Massachusetts has a better handle on data breaches than most states and what it's doing about it.

Follow me on Twitter.

Technology, Security

Efforts by states against cyber crime mixed

Blog-post by John Dodge,
Community Manager
, Wed, 09/21/2011 - 14:27

Data theft and loss is shockingly prevalent in my state. How about yours?


Technology, Big Data

Where next for Social Media in Business?

Blog-post by Peter Birley, Mon, 09/19/2011 - 10:28

The other day I was feeling fatigued with the amount of data I was filtering and was thinking there must be more to life? Was it just my age or was I experiencing social media fatigue. I have read recently that people have been leaving some well-known social media sites and then there has been the negative headlines regarding anti-social activities fuelled by social media, so obviously I am not alone.

Technology, Security

Cyber crime affects both cloud and non-cloud enterprises equally

Blog-post by Judy Redman,
HP Blogger
, Wed, 09/14/2011 - 18:29

We have spent spent considerable time on this forum discussing some of the well-publicized cyber attacks that have plagued business lately—Sony, Google, to name but a few.  There’s more news lately about cyber crime is because malicious insider attacks, viruses, denial-of-service and other cyber threats and liabilities have been escalating at an alarming rate.

(2) (2)

Technology, Security

CIO Cliff Notes on the 2nd Annual Ponemon "Cost of Cyber Crime" Study

Blog-post by Rafal Los, Wed, 09/14/2011 - 16:52

Dear CIO/CISO - let me sum up the survey for you, in 2 simple bullet points:

(3) (3)

Syndicate content