Security content on Enterprise CIO Forum

Business Issues, Technology, Applications, Big Data, Cloud, Mobility, Security

Six Things Every CEO Should Know About Cybersecurity

Blog-post by,
SteveDurbin

The importance of cyber security is no secret to anyone who watches the nightly news or, in this day and age, has attended a board meeting. Senior executives at businesses of all sizes understand that the global economy is still not adequately protected against cyber-attacks, despite years of effort and annual spending in the multi-billion dollar range.

(2)
   
(3) (3)

Business Issues, Technology, Security

Security #CIOchat draws record participants, Tweets

My favorite two conversations discuss CIO challenges and security resources.

Blog-post by,
Community Manager
,

Our Twitter chat on security yesterday set a record for participation. No doubt, security is top of mind for CIOs, a half dozen of which joined our chat.

We had 43 participants or about 25% more than usual and 356 Tweets when we've averaged in the neighborhood of 230 for the past few weeks. More participants are a good thing although it increases the number of cross conversations. Furious is sort of the nature of the chat beast, but the more chatsters, the merrier.


Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

Blog-post by,
Chris Patterson

News headlines are filled with enough stories about compromised data security to drive executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress. However, effective leaders recognize that threats to a computing environment are always present, and believe a more fruitful approach to operate a secure organization is to direct their IT teams to manage against real – not simply perceived – threats.

Rational vs. Irrational Fears

(2) (2)

Business Issues, Technology, Big Data, Cloud

Cloud chat recap: Security, app integration remain main barriers

Blog-post by,
Community Manager
,
jdodge

Our chat yesterday about today's biggest cloud challenges 3-4 years into explosive cloud growth largely focused on two mainstay barriers: security and app integration. Those hurdles, it seems, will be around for a long time, the chatterers indicated.

The further up enterprises go in the app pyramid, the tougher deployment gets. Click here for a candid PC World interview with HP CIO Ramon Baez that discusses examines what it takes to move to the cloud. 

(1) (1)

CIO Leadership, Applications

Driving your enterprise to the New Style of IT

Checkout the latest game in town at HP Discover

Blog-post by,
HP Blogger
,

This is not the first time auto-racing has played an integral part of HP Discover. Remember NASCAR’s Fan and Media Center from past conferences? So I wasn’t surprised to see a huge monitor with cars racing down the track when I walked into the Discover Zone here in Las Vegas—a city that is going through a transformation of its own, driven by the New Style of IT.


Business Issues, Technology, Security

"How to steal $60 million in 60 seconds"

"Think like the bad guy." HP Discover session details how cyber criminal plan attacks.

Blog-post by,
HP Blogger
,

Think like the bad guy. That will be the advice from several HP experts in the HP Discover session “How to steal $60 million in 60 seconds.”

(2)
   
(2) (2)

CIO Leadership, Cloud

Three equations for the most effective Cloud solutions

Building, managing and consuming workloads in a hybrid IT environment with HP Helion

Blog-post by,
HP Blogger
,

You may have a formula for the successful transformation to the Cloud, but what about the cloud-based solution itself? What are the defining characteristics for an effective cloud solution? This is best answered by taking a look at the challenges faced by enterprises today, and surfacing key needs that give more shape and form to the cloud solution characteristics.

(2) (2)

CIO Leadership, Technology, Applications, Cloud, Security

Customer indemnification catching on the in the cloud

Indemnifying customers against data loss or the prospect of legal action is becoming standard in the enterprise.

Blog-post by,
Community Manager
,

Indemnification is word that's spreading in the cloud community.

(1)
   
(3) (3)

Technology, Applications, Cloud, Converged Infrastructure, Services

Internet Of Things – Bringing the Smarts to Car, Home and Cities

Blog-post by,

We are in an increasingly internet connected  , or network enabled world encompassing laptops, desktop computers, smart phones,  industrial devices , house hold appliances etc. This connectivity eco system results in a world where smart connected devices vastly outnumber human population. IDC estimates by 2020 the number of connected devices will reach 212 billion units. This new paradigm sets the stage for IDC 3rd platform consisting of billions of devices running millions of apps or in simplified words – internet of things (IoT).


CIO Leadership, Big Data, Security

When Behavioral Analytics Meets Data Security

There's a new math-based method to identify threats to an organization. Understanding how it works can help us sift through the volumes of false positives and identify previously hidden threats.

Blog-post by,

Many security experts are now examining how mathematical models can be developed that determine baseline behavior across users and machines, detecting and surfacing anomalous and risky activities, and even anticipating threats before they happen. This is the promise of behavioral analytics when applied to data security. In practice, a proper implementation of the underlying mathematics and science must be combined with an ability to observe all the user and machine behaviors in real-time.


Syndicate content