Security content on Enterprise CIO Forum

Technology, Security

The era of Critical Security Controls (CSC)

SAN 20 CSCs encourage best security practices

Blog-post by,
vijaybasani

As information technology drives automation, improves service delivery and provides direct, positive impacts to top line revenue, information security takes a percentage of that revenue away due to investments in securing sensitive customer and corporate data – often in the form of expensive technology investments, without the proper process and staff required implement and manage it.

(2) (2)

Business Issues, Security

IBM MUSCLE FIGHTS FRAUD

Changing With The Crimes...

Blog-post by,

After 9/11, I lead Mktg & Biz Dev for IBM's Banking industry team.  We worked with some innovative startups using pattern recognition technology to focus on anti money laundering systems and to develop fraud detection apps.  This is an extension of that early work.  The opportunity has only grown.    

 


Business Issues, CIO Leadership, Technology, Big Data, Cloud, Mobility, Security

Information Runs Through It: Cohesive Cybersecurity Practices Will Strengthen the Enterprise

Blog-post by,
SteveDurbin

The rapid evolution of technology, in combination with global economic upheaval over the past few years, has caused a massive shift in the information security landscape. As a result, businesses are finding that they have even more limited resources than ever before which must be prioritized to areas of greatest need or return. The task of determining priorities is difficult in itself; the imperative is delivering more for less, both in terms of new investment and existing resources.

 


CIO Leadership, Big Data

Big Data myths, Rx for ALM, Super Bowl security blunders

Blog-post by,
Alec Wagner

As the associate editor of the Discover Performance blog, I'm quite keen on the great insights I find when reading posts by smart folks in the HP Software blogosphere:


Technology, Security

Requiring Employees To Have Pre-Installed Security Software

Ensuring the safety of the network is paramount

Blog-post by,

It's incredibly important to ensure that each employee's computer is secured from basic and complex attacks.  Should one computer get comprimised, it could lead to a domino effect throughout the network.  Recent examples, such as the major Target network breach and other similar stories should raise warning flags.  In the case of Target it's interesting to note that the malicious malware was introduced to the system after the hackers obtained network credentials from an HVAC client that Target was working with.  It's incredible to see what kind of methods these hackers u


CIO Leadership, Cloud

2014: The Year of Relevance

New Style of IT will drive enterprises to be relevant in 2014

Blog-post by,
HP Blogger
,

As the New Style of IT drives the forces of Cloud, Mobility, Security and Big Data various ways across global enterprises, I wonder about 2014. While the industry has continued to adopt these paradigms and related technologies in recent years, 2014 is the year when their multi-faceted characteristics come to a head; forcing enterprises and their constituents to be relevant. Enterprises must answer the question of the year of 2014 – Are they relevant? Join me as I take a look at what it means to be relevant in 2014.

(2)
   
(5) (5)

Business Issues, CIO Leadership, Security, Services

New types of cyber adversaries "coming on the scene"

HP Video by,
Community Manager
,

HP Enterprise security CTO Jacob West explains how cyber adversaries are broadening their reach and tool portfolio. The number of adversaries are "unlimited," explains West, who was interviewed at HP Discover in Barcelona. He also advises enterprises to "learn from the bad guys" through collaboration and offers several other security tips. 

(1)
   
(4) (4)

Business Issues, Big Data, Security

NSA spying pits companies against the government

Community Video by,
Community Manager
,

Spying program like PRISM pit U.S. companies against the federal government. How much does this keep you awake nights? asks Enterprise CIO Forum community manager John Dodge.


CIO Leadership, Cloud

The New Style of IT drives a New Style of Leadership

Competitive enterprises of tomorrow need a New Style of Leadership today

Blog-post by,
HP Blogger
,

Forbes Blogger Joe McKendrick identifies the 10 traits of highly effective cloud leaders – leaders  comfortable with the notion of bringing in


Business Issues, Services

what is Osiris Security and Protection?

Blog-post by,

Osiris Corporate Protection Services Canberra

A Concept in development for over two years with a combined industry experience of over 12 years Osiris Corporate Protection is a professional, qualified security company that prides itself on key operating functions such as; industry knowledge, client needs, and strategic management, A combination of which provides

(1) (1)

Syndicate content