Security content on Enterprise CIO Forum

Business Issues, Technology, Security

"How to steal $60 million in 60 seconds"

"Think like the bad guy." HP Discover session details how cyber criminal plan attacks.

Blog-post by,
HP Blogger
,

Think like the bad guy. That will be the advice from several HP experts in the HP Discover session “How to steal $60 million in 60 seconds.”

(2)
   
(2) (2)

CIO Leadership, Cloud

Three equations for the most effective Cloud solutions

Building, managing and consuming workloads in a hybrid IT environment with HP Helion

Blog-post by,
HP Blogger
,

You may have a formula for the successful transformation to the Cloud, but what about the cloud-based solution itself? What are the defining characteristics for an effective cloud solution? This is best answered by taking a look at the challenges faced by enterprises today, and surfacing key needs that give more shape and form to the cloud solution characteristics.

(2) (2)

CIO Leadership, Technology, Applications, Cloud, Security

Customer indemnification catching on the in the cloud

Indemnifying customers against data loss or the prospect of legal action is becoming standard in the enterprise.

Blog-post by,
Community Manager
,

Indemnification is word that's spreading in the cloud community.

(1)
   
(3) (3)

Technology, Applications, Cloud, Converged Infrastructure, Services

Internet Of Things – Bringing the Smarts to Car, Home and Cities

Blog-post by,

We are in an increasingly internet connected  , or network enabled world encompassing laptops, desktop computers, smart phones,  industrial devices , house hold appliances etc. This connectivity eco system results in a world where smart connected devices vastly outnumber human population. IDC estimates by 2020 the number of connected devices will reach 212 billion units. This new paradigm sets the stage for IDC 3rd platform consisting of billions of devices running millions of apps or in simplified words – internet of things (IoT).


CIO Leadership, Big Data, Security

When Behavioral Analytics Meets Data Security

There's a new math-based method to identify threats to an organization. Understanding how it works can help us sift through the volumes of false positives and identify previously hidden threats.

Blog-post by,

Many security experts are now examining how mathematical models can be developed that determine baseline behavior across users and machines, detecting and surfacing anomalous and risky activities, and even anticipating threats before they happen. This is the promise of behavioral analytics when applied to data security. In practice, a proper implementation of the underlying mathematics and science must be combined with an ability to observe all the user and machine behaviors in real-time.


Business Issues, Big Data, Mobility, Security

10 Top Information Security Threats for the Next Two Years

Big data, skills gap and mobile open paths to compromised data.

Quick Post by,
Community Manager
,
jdodge

The attached CIO.com slide show is worth scrolling through. It nicely summarizes the sources of security threats. 


Technology, Security

The era of Critical Security Controls (CSC)

SAN 20 CSCs encourage best security practices

Blog-post by,
vijaybasani

As information technology drives automation, improves service delivery and provides direct, positive impacts to top line revenue, information security takes a percentage of that revenue away due to investments in securing sensitive customer and corporate data – often in the form of expensive technology investments, without the proper process and staff required implement and manage it.

(3) (3)

Business Issues, Security

IBM MUSCLE FIGHTS FRAUD

Changing With The Crimes...

Blog-post by,

After 9/11, I lead Mktg & Biz Dev for IBM's Banking industry team.  We worked with some innovative startups using pattern recognition technology to focus on anti money laundering systems and to develop fraud detection apps.  This is an extension of that early work.  The opportunity has only grown.    

 


Business Issues, CIO Leadership, Technology, Big Data, Cloud, Mobility, Security

Information Runs Through It: Cohesive Cybersecurity Practices Will Strengthen the Enterprise

Blog-post by,
SteveDurbin

The rapid evolution of technology, in combination with global economic upheaval over the past few years, has caused a massive shift in the information security landscape. As a result, businesses are finding that they have even more limited resources than ever before which must be prioritized to areas of greatest need or return. The task of determining priorities is difficult in itself; the imperative is delivering more for less, both in terms of new investment and existing resources.

 


CIO Leadership, Big Data

Big Data myths, Rx for ALM, Super Bowl security blunders

Blog-post by,
Alec Wagner

As the associate editor of the Discover Performance blog, I'm quite keen on the great insights I find when reading posts by smart folks in the HP Software blogosphere:


Syndicate content