Security content on Enterprise CIO Forum

Business Issues, Technology, Big Data, Cloud

Cloud chat recap: Security, app integration remain main barriers

Blog-post by,
Community Manager
,
jdodge

Our chat yesterday about today's biggest cloud challenges 3-4 years into explosive cloud growth largely focused on two mainstay barriers: security and app integration. Those hurdles, it seems, will be around for a long time, the chatterers indicated.

The further up enterprises go in the app pyramid, the tougher deployment gets. Click here for a candid PC World interview with HP CIO Ramon Baez that discusses examines what it takes to move to the cloud. 

(1) (1)

CIO Leadership, Applications

Driving your enterprise to the New Style of IT

Checkout the latest game in town at HP Discover

Blog-post by,
HP Blogger
,

This is not the first time auto-racing has played an integral part of HP Discover. Remember NASCAR’s Fan and Media Center from past conferences? So I wasn’t surprised to see a huge monitor with cars racing down the track when I walked into the Discover Zone here in Las Vegas—a city that is going through a transformation of its own, driven by the New Style of IT.


Business Issues, Technology, Security

"How to steal $60 million in 60 seconds"

"Think like the bad guy." HP Discover session details how cyber criminal plan attacks.

Blog-post by,
HP Blogger
,

Think like the bad guy. That will be the advice from several HP experts in the HP Discover session “How to steal $60 million in 60 seconds.”

(2)
   
(2) (2)

CIO Leadership, Cloud

Three equations for the most effective Cloud solutions

Building, managing and consuming workloads in a hybrid IT environment with HP Helion

Blog-post by,
HP Blogger
,

You may have a formula for the successful transformation to the Cloud, but what about the cloud-based solution itself? What are the defining characteristics for an effective cloud solution? This is best answered by taking a look at the challenges faced by enterprises today, and surfacing key needs that give more shape and form to the cloud solution characteristics.

(2) (2)

CIO Leadership, Technology, Applications, Cloud, Security

Customer indemnification catching on the in the cloud

Indemnifying customers against data loss or the prospect of legal action is becoming standard in the enterprise.

Blog-post by,
Community Manager
,

Indemnification is word that's spreading in the cloud community.

(1)
   
(3) (3)

Technology, Applications, Cloud, Converged Infrastructure, Services

Internet Of Things – Bringing the Smarts to Car, Home and Cities

Blog-post by,

We are in an increasingly internet connected  , or network enabled world encompassing laptops, desktop computers, smart phones,  industrial devices , house hold appliances etc. This connectivity eco system results in a world where smart connected devices vastly outnumber human population. IDC estimates by 2020 the number of connected devices will reach 212 billion units. This new paradigm sets the stage for IDC 3rd platform consisting of billions of devices running millions of apps or in simplified words – internet of things (IoT).


CIO Leadership, Big Data, Security

When Behavioral Analytics Meets Data Security

There's a new math-based method to identify threats to an organization. Understanding how it works can help us sift through the volumes of false positives and identify previously hidden threats.

Blog-post by,

Many security experts are now examining how mathematical models can be developed that determine baseline behavior across users and machines, detecting and surfacing anomalous and risky activities, and even anticipating threats before they happen. This is the promise of behavioral analytics when applied to data security. In practice, a proper implementation of the underlying mathematics and science must be combined with an ability to observe all the user and machine behaviors in real-time.


Business Issues, Big Data, Mobility, Security

10 Top Information Security Threats for the Next Two Years

Big data, skills gap and mobile open paths to compromised data.

Quick Post by,
Community Manager
,
jdodge

The attached CIO.com slide show is worth scrolling through. It nicely summarizes the sources of security threats. 


Technology, Security

The era of Critical Security Controls (CSC)

SAN 20 CSCs encourage best security practices

Blog-post by,
vijaybasani

As information technology drives automation, improves service delivery and provides direct, positive impacts to top line revenue, information security takes a percentage of that revenue away due to investments in securing sensitive customer and corporate data – often in the form of expensive technology investments, without the proper process and staff required implement and manage it.

(3) (3)

Business Issues, Security

IBM MUSCLE FIGHTS FRAUD

Changing With The Crimes...

Blog-post by,

After 9/11, I lead Mktg & Biz Dev for IBM's Banking industry team.  We worked with some innovative startups using pattern recognition technology to focus on anti money laundering systems and to develop fraud detection apps.  This is an extension of that early work.  The opportunity has only grown.    

 


Syndicate content