Security content on Enterprise CIO Forum

Business Issues, Services

what is Osiris Security and Protection?

Blog-post by,

Osiris Corporate Protection Services Canberra

A Concept in development for over two years with a combined industry experience of over 12 years Osiris Corporate Protection is a professional, qualified security company that prides itself on key operating functions such as; industry knowledge, client needs, and strategic management, A combination of which provides

(1) (1)

CIO Leadership, Cloud, Mobility, Services

Mobile and cloud the new value creators: HP CIO Ramon Baez

Leadership Video ,

HP Global CIO and senior vice president Ramon Baez explains how the new business drivers of cloud and mobile contribute the bottom and top lines. He also discusses IT costs, security, the need for top IT talent and the increased speed necessary to compete in today's business environment. It used to take three weeks to provision a database. Now it takes five minutes in a cloud environment, says Baez. CIO publisher emeritus Gary Beach conducts the interview.   

(4)
   
(10) (10)

Business Issues, Applications, IT Performance

CIOS should come to the dark side

Community Video by,
Community Manager
,

A controversial new book advises CIOs to adopt Machiavellian tactics to advance their cause...or just survive. Are you willing to manipulate your rivals and exercise power? Enterprise CIO Forum community manager John Dodge explores some darker possibilities.  

(1) (1)

Technology, Cloud

Cloud Computing - Wall Street Style

How Wall Street is getting it all wrong.

Blog-post by,

Is Wall Street keeping up with cloud computing?

Not really.

(3)
   
(5) (5)

Business Issues, Security

IT security pros troubled by changing threats, lack of collaboration

The CIO Quick Pulse survey reveals that security professionals are in a precarious position.

They are reacting to more sophisticated and challenging threats. Indeed, a survey of 76 security pros found that 64% are either "treading water or playing whack a mole."  This white paper also looks at internal threats and cultures that need to be educated about security.

The attached research brief also notes that security pros are as bad at collaborating as hackers are good. This needs to change. 

Check it out. 

(8) (8)

CIO Leadership, Security

HP´s vision for the enterprise security market

Keynote speaker Art Gilliland, SVP of HP Software Enterprise Security Products, will discuss HP's vision for the enterprise security market. In an era in which security threats are a professional "market" characterized by highly specialized participants who steal, buy and sell sensitive information, how can enterprises protect themselves? Combating these new adversaries requires specialized controls at every step in the attack process as well as solutions for resolving the damage after a breach occurs. Mr.

(1) (1)

Business Issues, Cloud

The Cloud: A Cost-Effective Way to Face BYOD’s Security Challenges

Blog-post by,
RickBlaisdell

A trend quickly embraced by end users, BYOD makes companies and  IT managers shiver when thinking about security and compliance implications.

If the number of employees that bring their own device to work is continuously increasing, so does the number of vulnerable entry points into sensitive corporate data. Organizations find themselves in the situation of managing even more computing devices and having to protect themselves against security threats and costs to support these devices.

(3)
   
(5) (5)

Technology, Big Data, Services

Many Big Data developers think the government is spying on them

Were we better off when all that unstructured data was lying fallow?

Blog-post by,
Community Manager
,
jdodge

What is it about Big Data developers that makes them feel like the government is spying on them? As the Kinks lyrics go, "Paranoia, the destroyer."

According to an Evans Data survey, 4 out of 10 think just that. The reality is that if you living make you living analyzing data, you have to wonder who's looking at it.


CIO Leadership, Security

The Grand Central of collaborative security intelligence

Countering Adversaries R Us - the underground network of predators

Blog-post by,
HP Blogger
,

The concept of “Adversaries R Us” represents a well-knit fabric of coordinated, innovative predators conspiring together in a worldwide hacking and data breach scheme. They have successfully exploited security vulnerabilities to obtain access to confidential information – as charged in this federal indictment from the United States Attorney's Office. Enterprises can attempt to deal with such exploits on their own.

(11) (11)

Business Issues, Big Data, Cloud, Mobility, Security

7 Biggest IT Compliance Headaches and How CIOs Can Cure Them

Blog-post by,
Community Manager
,
jdodge

Can you identify what the biggest compliance risks and headaches are? Certainly, they vary from across IT departments.

(3) (3)

Syndicate content