Security content on Enterprise CIO Forum

Business Issues, CIO Leadership, Technology, Cloud, Converged Infrastructure, IT Performance, Mobility, Security

Boost Security in the Cloud: Four Best Practices for CIOs

Blog-post by,
deisner

According to the Wall Street Journal, CIOs are increasingly called upon to be the “end point” for cloud security. Front-line IT professionals, admins and even chief security officers (CSOs) typically report to the CIO — and if CIOs don't have a clear cloud security mandate, enterprise networks are at risk. Here are four best practices for CIOs to help ensure maximum cloud security.


Technology, Security

Mobile App Assessment Shines Spotlight on Exposure Risks

Blog-post by,
michael_dager

It’s hard for most of us to imagine modern life without smartphones and tablets. The thought of being tied to a desk or laptop in order to work and play online seems a quaint notion from the distant past. Yet most of the big changes have happened in the last 5-10 years. Rapid advancements in mobile computing and mobile apps continue apace; Vision Mobile puts the worth of the global app economy at $68 billion in 2013, with a projected 2016 value of $143 billion.


Business Issues, Security

Data breaches more varied in 2013

"The year of retail data breach." Espionage on the rise, money crimes declining?

Blog-post by,
Community Manager
,

When it comes to the sheer volume of stats and information, Verizon's 2014 Data Breach Investigations Report (DBIR) is hard to beat. It's chock full of them -- a must read for anyone in computer security.

A few things jumped out at me. Among them:


Business Issues, Technology, Mobility, Security

5 Ways Employees Create Security Risks for Businesses

Blog-post by,

The Target, Inc. data hack, the Heartbleed Bug---these and other security breaches serve as stark reminders for businesses of the very real risks of doing business in a web-connected world. On the upside, these high-profile hacks reinforce the dangers of cyber-attacks from without. But on the downside, they tend to distract organizations from focusing on mounting security risks caused by their own employees from within.

(6)
   
(1) (1)

Business Issues, Technology, Applications, Big Data, Cloud, Mobility, Security

Six Things Every CEO Should Know About Cybersecurity

Blog-post by,
SteveDurbin

The importance of cyber security is no secret to anyone who watches the nightly news or, in this day and age, has attended a board meeting. Senior executives at businesses of all sizes understand that the global economy is still not adequately protected against cyber-attacks, despite years of effort and annual spending in the multi-billion dollar range.

(2)
   
(3) (3)

Business Issues, Technology, Security

Security #CIOchat draws record participants, Tweets

My favorite two conversations discuss CIO challenges and security resources.

Blog-post by,
Community Manager
,

Our Twitter chat on security yesterday set a record for participation. No doubt, security is top of mind for CIOs, a half dozen of which joined our chat.

We had 43 participants or about 25% more than usual and 356 Tweets when we've averaged in the neighborhood of 230 for the past few weeks. More participants are a good thing although it increases the number of cross conversations. Furious is sort of the nature of the chat beast, but the more chatsters, the merrier.


Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

Blog-post by,
Chris Patterson

News headlines are filled with enough stories about compromised data security to drive executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress. However, effective leaders recognize that threats to a computing environment are always present, and believe a more fruitful approach to operate a secure organization is to direct their IT teams to manage against real – not simply perceived – threats.

Rational vs. Irrational Fears

(2) (2)

Business Issues, Technology, Big Data, Cloud

Cloud chat recap: Security, app integration remain main barriers

Blog-post by,
Community Manager
,
jdodge

Our chat yesterday about today's biggest cloud challenges 3-4 years into explosive cloud growth largely focused on two mainstay barriers: security and app integration. Those hurdles, it seems, will be around for a long time, the chatterers indicated.

The further up enterprises go in the app pyramid, the tougher deployment gets. Click here for a candid PC World interview with HP CIO Ramon Baez that discusses examines what it takes to move to the cloud. 

(1) (1)

CIO Leadership, Applications

Driving your enterprise to the New Style of IT

Checkout the latest game in town at HP Discover

Blog-post by,
HP Blogger
,

This is not the first time auto-racing has played an integral part of HP Discover. Remember NASCAR’s Fan and Media Center from past conferences? So I wasn’t surprised to see a huge monitor with cars racing down the track when I walked into the Discover Zone here in Las Vegas—a city that is going through a transformation of its own, driven by the New Style of IT.


Business Issues, Technology, Security

"How to steal $60 million in 60 seconds"

"Think like the bad guy." HP Discover session details how cyber criminal plan attacks.

Blog-post by,
HP Blogger
,

Think like the bad guy. That will be the advice from several HP experts in the HP Discover session “How to steal $60 million in 60 seconds.”

(2)
   
(2) (2)

Syndicate content