Enterprise security content on Enterprise CIO Forum

Technology, Mobility

Video: best practices for securing mobile devices

Community Video by,
Community Manager
,

Enterprise CIO Forum community manager John Dodge reviews Forrester Research's 20 best practices for managing and securing mobile devices.

Follow John Dodge on Twitter.


Technology, Cloud

What's your state doing about cyber crime?

Community Video by,
Community Manager
,

Enterprise CIO Forum community manager John Dodge discusses why Massachusetts has a better handle on data breaches than most states and what it's doing about it.

Follow me on Twitter.


Technology, Security

Efforts by states against cyber crime mixed

Blog-post by,
Community Manager
,

Data theft and loss is shockingly prevalent in my state. How about yours?

(1)
   

Technology, Big Data

Where next for Social Media in Business?

Blog-post by,
PeterBirley

The other day I was feeling fatigued with the amount of data I was filtering and was thinking there must be more to life? Was it just my age or was I experiencing social media fatigue. I have read recently that people have been leaving some well-known social media sites and then there has been the negative headlines regarding anti-social activities fuelled by social media, so obviously I am not alone.


Technology, Security

Cyber crime affects both cloud and non-cloud enterprises equally

Blog-post by,
HP Blogger
,

We have spent spent considerable time on this forum discussing some of the well-publicized cyber attacks that have plagued business lately—Sony, Google, to name but a few.  There’s more news lately about cyber crime is because malicious insider attacks, viruses, denial-of-service and other cyber threats and liabilities have been escalating at an alarming rate.

(3)
   
(2) (2)

Technology, Security

CIO Cliff Notes on the 2nd Annual Ponemon "Cost of Cyber Crime" Study

Blog-post by,
Wh1t3Rabbit

Dear CIO/CISO - let me sum up the survey for you, in 2 simple bullet points:

(2)
   
(3) (3)

Technology, Security

Information systems = "multi-dimensional attack space"

Blog-post by,
Community Manager
,
jdodge

"Multi-dimensional attach space!" Sounds pretty awful, doesn't it? Well, that's the operative phrase in a new cyber security study.   

(3) (3)

Technology, Security

Enterprise security impeded by compliance, paper-pushing...agility needed

Blog-post by,
Community Manager
,
jdodge

I found a marvelous four-part series that examines what's wrong with enterprise security and what needs to change.

Fair warning, though. The installments are 'glass-half-empty' in tone and substance. Security wonks tend to take a suspicious and negative view of the world. After all, they're dealing with creeps and a wide range of misdeeds and criminal behaviors. No one would listen to a polyanna-ish security expert, anyway. 

(1)
   
(2) (2)

Technology, Security

Enterprise security front and center

Blog-post by,
Community Manager
,
jdodge

Summer might not be officially over with the start of September, but after Labor Day, it's back to business. We want to start with some renewed focus on several topics, one of which is enterprise security.  As enterprises leverage ever larger amounts of critical data, security becomes doubly critical.  Actually, saying security is  critical doesn't quite seem to do justice in framing its importance.


Syndicate content