Security content on Enterprise CIO Forum

CIO Leadership, Security

Converged security: When departments collaborate, everyone wins

Operations and security must work together to break down silos, while the CIO/CISO cracks the whip

Blog-post by,
Gerben Verstraete

Rather than bother with a simple denial of service attack, today’s cybercriminals are most likely to go after your intellectual property and enterprise data. You can’t battle the current crop of bad guys with yesterday’s static policy-based frameworks — instead, you must actively safeguard data and search for threats.

(1)
   
(3) (3)

Business Issues, CIO Leadership, Technology, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security

Managing Risk in a Cyber-Enabled World

Blog-post by,
SteveDurbin

Cyber-attacks continue to become more innovative and sophisticated than ever before. Data breaches at major retail brands such as Target, Neiman Marcus, Michaels, Home Depot and more have demonstrated that cyber risk is an ever-growing concern for businesses around the world. In today’s cyber age, a company’s reputation – and the trust dynamic that exists amongst suppliers, customers and partners – has become a very real target for cybercriminals and hacktivists.


CIO Leadership, Cloud

Five questions the board might ask the CIO about the cloud

Selling the cloud to the C suite and board

Blog-post by,
Community Manager
,

When I saw the headline "Selling the cloud to the board," I immediately wanted to share the story. After all, a big part of a CIO's job is selling their agenda to the board...or the C suite or a budget committee.

This CIO.com Australia case study about why car sales lead company carsales.com.au moved to the cloud has several insights, but it left me wanting more. The story primarily address the board's questions about what if it's public cloud went down.

(1)
   

Technology, Security

The Best Defense for Open Source Security: Offense

Blog-post by,
Bill_Ledingham

It doesn’t take much more than a glance at the news to learn that cyber attacks have advanced far beyond the phishing and linkbait methods of years past. As enterprise technologies have progressed in their capabilities and complexities, so have today’s attackers. They always seem to be one step ahead of organizations. The more interconnected technology becomes, the more vulnerable it is to attacks.

(3) (3)

Technology, Cloud, Security

Cloud will be dominant by 2020

So sayeth the #CIOchat Twitter chat.

Blog-post by,
Community Manager
,

There used to be a saying that no one ever got fired for buying IBM. Six year hence, that same saying might be applied to the cloud. No ever ever got fired for buying the cloud. More to the point, someone will get fired for NOT buying the cloud.

That was the consensus of our Twitter chat last Thursday asking where will the cloud be by 2020?

(2) (2)

Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by,

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(2)
   
(4) (4)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security

Protecting Against Critical Infrastructure Attacks

Blog-post by,
ThuPham

The Nuclear Regulatory Commission (NRC) was recently the target of three separate breaches. Why is this important? Created by Congress, the NRC regulates commercial nuclear power plants and other uses of nuclear materials, like nuclear medicine. They regulate three major areas, including:

(1) (1)

CIO Leadership, Converged Infrastructure, Security

Hacking

How do you know whether your firm is likely to be next in line and even worse, how well your firm’s IT will handle the breach?

Blog-post by,

Is your firm ready?

Over the last year, a number of high profile data security breaches have taken place at major US corporations. However, as a business person, how do you know the answers to the above two questions.  Do you know what is at risk? And as well with big data gathering so much attention these days, isn’t it kind of like putting all the eggs into one basket? According to the management scholar, Theodore Levitt, part of being a manager is the ability to ask questions.

(1) (1)

Syndicate content