Security content on Enterprise CIO Forum

CIO Leadership, Technology, Applications, Security

Launching a Software Security Assurance Program - What does it take?

Blog-post by,
HP Blogger
,

It continues to surprise me when speaking to firms that have otherwise mature information security programs but haven’t stood up a software security assurance function within their organizations. This is especially surprising given the prevalence of attacks exploiting application security weaknesses. Granted, funding is required and establishing a capability is not easy to do.

(3)
   
(2) (2)

Technology, Security

The Best Defense for Open Source Security: Offense

Blog-post by,
Bill_Ledingham

It doesn’t take much more than a glance at the news to learn that cyber attacks have advanced far beyond the phishing and linkbait methods of years past. As enterprise technologies have progressed in their capabilities and complexities, so have today’s attackers. They always seem to be one step ahead of organizations. The more interconnected technology becomes, the more vulnerable it is to attacks.

(3) (3)

Technology, Cloud, Security

Cloud will be dominant by 2020

So sayeth the #CIOchat Twitter chat.

Blog-post by,
Community Manager
,

There used to be a saying that no one ever got fired for buying IBM. Six year hence, that same saying might be applied to the cloud. No ever ever got fired for buying the cloud. More to the point, someone will get fired for NOT buying the cloud.

That was the consensus of our Twitter chat last Thursday asking where will the cloud be by 2020?

(2) (2)

Business Issues, Security

Ten Cyber Security Resources

Cost per cyber attack rises dramatically.

Blog-post by,

The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did you know that the average cost of a cyber attack is now around $12.7 million dollars—up from $11.6M last year? Or that the time to resolve these attacks has increased 41% to 45 days?

These are eye opening statistics.

(2)
   
(4) (4)

CIO Leadership, Security

The expanding circle of distrust fueled by the Internet of Things (IoT)

You may get what you pay for ... They can get what you pay with!

Blog-post by,
HP Blogger
,

I whip out my device to make a payment at the checkout counter of our local hardware store.  And I pause.  Should I let the point-of-sale system extract all my data?

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security

Protecting Against Critical Infrastructure Attacks

Blog-post by,
ThuPham

The Nuclear Regulatory Commission (NRC) was recently the target of three separate breaches. Why is this important? Created by Congress, the NRC regulates commercial nuclear power plants and other uses of nuclear materials, like nuclear medicine. They regulate three major areas, including:

(1) (1)

CIO Leadership, Converged Infrastructure, Security

Hacking

How do you know whether your firm is likely to be next in line and even worse, how well your firm’s IT will handle the breach?

Blog-post by,

Is your firm ready?

Over the last year, a number of high profile data security breaches have taken place at major US corporations. However, as a business person, how do you know the answers to the above two questions.  Do you know what is at risk? And as well with big data gathering so much attention these days, isn’t it kind of like putting all the eggs into one basket? According to the management scholar, Theodore Levitt, part of being a manager is the ability to ask questions.

(1) (1)

CIO Leadership, Applications, Cloud, Services

The CIO is not in control

IT services Twitter cat recap

Blog-post by,
Community Manager
,
jdodge

The answer to how much CIOs should focus on IT services was a rich discussion with is no black and white answer. It's a classic "it depends" question. IT services was the topic of our weekly Twitter chat yesterday.

(2)
   
(1) (1)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Who’s Liable After a Data Breach?

Blog-post by,
ThuPham

After a data breach undergoes investigation, the unraveling of the mess afterwards can take months, or even years, to resolve. In addition to incurring costs of the requisite free identity monitoring services, as well as the costs of overhauling security in their IT infrastructure, a victim organization can face multiple class-action lawsuits.

(1) (1)

Syndicate content