Security content on Enterprise CIO Forum

Business Issues, Applications, Mobility, Security

So many security concerns and topics, so little time

"Fake cell towers!?" See conversation 2.

Blog-post by John Dodge,
Community Manager
, Fri, 11/14/2014 - 15:42

Our #CIOchat yesterday about security nightmares touched on human error, penetration testing, privacy, Point of Sale vulnerabilities, training, education, layered security, 7x24 threat monitoring and who should be charge of enterprise cyber security. The sheer number of topics expresses the complex and never ending task of keeping enterprise data secure.

Business Issues, CIO Leadership, Technology, Cloud, IT Performance, Mobility, Security

Stolen Credentials Led to Data Breaches at Universities

Blog-post by Thu Pham, Tue, 11/11/2014 - 17:49

Earlier this year, the University of Maryland suffered a data breach of more than 300k students and personnel, prompting an investigation by the Secret Service and resulting in a testimony before Congress by the UMD president. As the Chronicle of Higher Education reported, the total costs of the data breach could easily reach millions of dollars, with expenses spread across five years of credit monitoring, legal and IT forensics firm fees.


Business Issues, Cloud, IT Infrastructure, Security

What security threats keep you awake at night?

#CIOchat's topic for this week: 2-3 p.m. ET Thursday

Blog-post by John Dodge,
Community Manager
, Mon, 11/10/2014 - 17:01

I just read an excellent piece about what constitutes a "malicious insider." The post by two HP security strategists asserts that malicious insiders are much more than disgruntled or bumbling employees.

Here's how post authors Dan Schulte and Neil Bryden describe malicious insiders.

CIO Leadership, Security

Take a Value Chain approach to secure your enterprise

Embed security in each activity performed by IT every day

Blog-post by Michael Garrett, Mon, 11/03/2014 - 17:09
Michael Garrett

We all know enterprise security is changing. It’s becoming imperative to integrate security into every aspect of IT. We call this approach Converged Security, and it fits into the way IT is evolving.

(2) (2)

CIO Leadership, Security

Converged Security: Why we should integrate Security and IT Operations

Achieve benefits of scale by uniting teams for mutual benefit

Blog-post by Michael Garrett, Thu, 10/30/2014 - 18:45
Michael Garrett

The threat landscape is changing rapidly. It wasn’t so long ago that CISOs were worried about worms and viruses. Back then, the focus was on perimeter defense. But today’s high-profile security attacks exploit internal weaknesses. They’re often slow moving and hard to detect. Security is having to cover more ground, and in the process its activities are overlapping with those performed by IT Operations.

The good news is this overlap gives IT an opportunity to cut costs, improve efficiency, and reduce waste.

Monitor, detect, correct

CIO Leadership, Security

Converged security: When departments collaborate, everyone wins

Operations and security must work together to break down silos, while the CIO/CISO cracks the whip

Blog-post by Gerben Verstraete, Wed, 10/29/2014 - 22:25
Gerben Verstraete

Rather than bother with a simple denial of service attack, today’s cybercriminals are most likely to go after your intellectual property and enterprise data. You can’t battle the current crop of bad guys with yesterday’s static policy-based frameworks — instead, you must actively safeguard data and search for threats.

(3) (3)

Business Issues, CIO Leadership, Technology, Big Data, Cloud, IT Infrastructure, IT Performance, Mobility, Security

Managing Risk in a Cyber-Enabled World

Blog-post by Steve Durbin, Tue, 10/28/2014 - 17:50

Cyber-attacks continue to become more innovative and sophisticated than ever before. Data breaches at major retail brands such as Target, Neiman Marcus, Michaels, Home Depot and more have demonstrated that cyber risk is an ever-growing concern for businesses around the world. In today’s cyber age, a company’s reputation – and the trust dynamic that exists amongst suppliers, customers and partners – has become a very real target for cybercriminals and hacktivists.

CIO Leadership, Cloud

Five questions the board might ask the CIO about the cloud

Selling the cloud to the C suite and board

Blog-post by John Dodge,
Community Manager
, Mon, 10/27/2014 - 17:40

When I saw the headline "Selling the cloud to the board," I immediately wanted to share the story. After all, a big part of a CIO's job is selling their agenda to the board...or the C suite or a budget committee.

This Australia case study about why car sales lead company moved to the cloud has several insights, but it left me wanting more. The story primarily address the board's questions about what if it's public cloud went down.


Technology, Security

The Best Defense for Open Source Security: Offense

Blog-post by Bill Ledingham, Mon, 10/20/2014 - 21:43

It doesn’t take much more than a glance at the news to learn that cyber attacks have advanced far beyond the phishing and linkbait methods of years past. As enterprise technologies have progressed in their capabilities and complexities, so have today’s attackers. They always seem to be one step ahead of organizations. The more interconnected technology becomes, the more vulnerable it is to attacks.

(3) (3)

Syndicate content