Security content on Enterprise CIO Forum

CIO Leadership, Converged Infrastructure, Security

Hacking

How do you know whether your firm is likely to be next in line and even worse, how well your firm’s IT will handle the breach?

Blog-post by,

Is your firm ready?

Over the last year, a number of high profile data security breaches have taken place at major US corporations. However, as a business person, how do you know the answers to the above two questions.  Do you know what is at risk? And as well with big data gathering so much attention these days, isn’t it kind of like putting all the eggs into one basket? According to the management scholar, Theodore Levitt, part of being a manager is the ability to ask questions.

(1) (1)

CIO Leadership, Applications, Cloud, Services

The CIO is not in control

IT services Twitter cat recap

Blog-post by,
Community Manager
,
jdodge

The answer to how much CIOs should focus on IT services was a rich discussion with is no black and white answer. It's a classic "it depends" question. IT services was the topic of our weekly Twitter chat yesterday.

(1) (1)

CIO Leadership, Security

Security challenges are unique to the enterprise – not to the cloud

Secure enterprises at large are secure in the cloud too

Blog-post by,
HP Blogger
,

On a recent flight, as we began our descent, the flight shuddered with some ups and downs from turbulence -- giving me that insecure feeling.  I looked out the window and saw dense cloud formations.  This aircraft (symbolic of an enterprise) was in the Cloud.  Hence the turbulence and that insecure feeling.  As the aircraft descended further, I could clearly see the beautiful Florida landscape.  Clear skies.  But then turbulence occurred again -- even

(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Who’s Liable After a Data Breach?

Blog-post by,
ThuPham

After a data breach undergoes investigation, the unraveling of the mess afterwards can take months, or even years, to resolve. In addition to incurring costs of the requisite free identity monitoring services, as well as the costs of overhauling security in their IT infrastructure, a victim organization can face multiple class-action lawsuits.

(1) (1)

Business Issues, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Risk, Cost and Technical Gaps Threaten Cloud Growth

Blog-post by,
JohnHawkins

This contributed post was co-authored by Mark Reyes, Business Analyst, RiverMeadow Software

The business of the cloud is booming, which is evident by aggressive year-over-year growth forecasts for cloud - estimated in the range of 18-35% growth with market projections of more than $100 billion.

(1) (1)

Technology, Cloud

Internet of Things Clouding up Existing Infrastructure

Blog-post by,
Chris Patterson

More than a decade ago, I attended a Sun Microsystems conference and remember former Chairman/CEO Scott McNealy talking about a future where a light bulb would know when it was about to die and automatically place an order for a replacement. McNealy's vision was as prescient as always (does anyone now doubt "The Network is the Computer?”), and we are slowly being surrounded by thermostats, refrigerators and bathroom scales that send data to and from the Internet.


CIO Leadership, Security

The paradox of secured access to data that matters

Balancing the security posture for your enterprise

Blog-post by,
HP Blogger
,

Recently, I encrypted my device based upon a recommended precautionary procedure.  However, I later learned that this was only meant for a select set of devices.  Of course, my device was not one of them!

(1)
   
(1) (1)

Technology, Applications, Security

Credit card hacks abound. What's going on?

We chat about this 2-3 p.m. ET today... #CIOchat

Blog-post by,
Community Manager
,

This week, it Home Depot's credit cards. A few weeks ago, it's Target's. Is any of your financial information safe? 

That's what we are discussing in today's Twitter chat. Our main question is "What does the recent spate of credit cards hacks say about the state of cybersecurity?"

The chat is from 2-3 p.m. ET, hashtag #CIOchat

(7)
   

Technology, Big Data

Changing styles of IT driven by the fashionable world of IoT

A cool bracelet from – wait for IT – Intel!

Blog-post by,
HP Blogger
,

“For most wearable makers, it would be in their best interest to stop worrying about the gizmos inside, and start worrying about the look and feel of their products -- says Nick Bilton in this New York Times article that refers to various wearables including the MICA –bracelet recently announced by Intel.&

(1) (1)

Business Issues, CIO Leadership, Security

The healthcare industry needs a new security prescription

What recent high profile PHI data breaches can teach other industries

Blog-post by,
HP Blogger
,

It’s not just hospital gowns that are exposing things best left private – it’s also data breaches.

(1)
   
(3) (3)

Syndicate content