Security content on Enterprise CIO Forum

Business Issues, Cloud, Converged Infrastructure, Security

What security threats keep you awake at night?

#CIOchat's topic for this week: 2-3 p.m. ET Thursday

Blog-post by John Dodge,
Community Manager
, Mon, 11/10/2014 - 17:01

I just read an excellent piece about what constitutes a "malicious insider." The post by two HP security strategists asserts that malicious insiders are much more than disgruntled or bumbling employees.

Here's how post authors Dan Schulte and Neil Bryden describe malicious insiders.

CIO Leadership, Security

Take a Value Chain approach to secure your enterprise

Embed security in each activity performed by IT every day

Blog-post by Michael Garrett, Mon, 11/03/2014 - 17:09
Michael Garrett

We all know enterprise security is changing. It’s becoming imperative to integrate security into every aspect of IT. We call this approach Converged Security, and it fits into the way IT is evolving.

(2) (2)

CIO Leadership, Security

Converged Security: Why we should integrate Security and IT Operations

Achieve benefits of scale by uniting teams for mutual benefit

Blog-post by Michael Garrett, Thu, 10/30/2014 - 18:45
Michael Garrett

The threat landscape is changing rapidly. It wasn’t so long ago that CISOs were worried about worms and viruses. Back then, the focus was on perimeter defense. But today’s high-profile security attacks exploit internal weaknesses. They’re often slow moving and hard to detect. Security is having to cover more ground, and in the process its activities are overlapping with those performed by IT Operations.

The good news is this overlap gives IT an opportunity to cut costs, improve efficiency, and reduce waste.

Monitor, detect, correct

CIO Leadership, Security

Converged security: When departments collaborate, everyone wins

Operations and security must work together to break down silos, while the CIO/CISO cracks the whip

Blog-post by Gerben Verstraete, Wed, 10/29/2014 - 22:25
Gerben Verstraete

Rather than bother with a simple denial of service attack, today’s cybercriminals are most likely to go after your intellectual property and enterprise data. You can’t battle the current crop of bad guys with yesterday’s static policy-based frameworks — instead, you must actively safeguard data and search for threats.

(3) (3)

Business Issues, CIO Leadership, Technology, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security

Managing Risk in a Cyber-Enabled World

Blog-post by Steve Durbin, Tue, 10/28/2014 - 17:50

Cyber-attacks continue to become more innovative and sophisticated than ever before. Data breaches at major retail brands such as Target, Neiman Marcus, Michaels, Home Depot and more have demonstrated that cyber risk is an ever-growing concern for businesses around the world. In today’s cyber age, a company’s reputation – and the trust dynamic that exists amongst suppliers, customers and partners – has become a very real target for cybercriminals and hacktivists.

CIO Leadership, Cloud

Five questions the board might ask the CIO about the cloud

Selling the cloud to the C suite and board

Blog-post by John Dodge,
Community Manager
, Mon, 10/27/2014 - 17:40

When I saw the headline "Selling the cloud to the board," I immediately wanted to share the story. After all, a big part of a CIO's job is selling their agenda to the board...or the C suite or a budget committee.

This Australia case study about why car sales lead company moved to the cloud has several insights, but it left me wanting more. The story primarily address the board's questions about what if it's public cloud went down.


Technology, Security

The Best Defense for Open Source Security: Offense

Blog-post by Bill Ledingham, Mon, 10/20/2014 - 21:43

It doesn’t take much more than a glance at the news to learn that cyber attacks have advanced far beyond the phishing and linkbait methods of years past. As enterprise technologies have progressed in their capabilities and complexities, so have today’s attackers. They always seem to be one step ahead of organizations. The more interconnected technology becomes, the more vulnerable it is to attacks.

(3) (3)

Technology, Cloud, Security

Cloud will be dominant by 2020

So sayeth the #CIOchat Twitter chat.

Blog-post by John Dodge,
Community Manager
, Mon, 10/20/2014 - 17:45

There used to be a saying that no one ever got fired for buying IBM. Six year hence, that same saying might be applied to the cloud. No ever ever got fired for buying the cloud. More to the point, someone will get fired for NOT buying the cloud.

That was the consensus of our Twitter chat last Thursday asking where will the cloud be by 2020?

(2) (2)

Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by Kate Senie, Thu, 10/16/2014 - 02:02

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(4) (4)

Syndicate content