Security content on Enterprise CIO Forum

Business Issues, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Risk, Cost and Technical Gaps Threaten Cloud Growth

Blog-post by,
JohnHawkins

This contributed post was co-authored by Mark Reyes, Business Analyst, RiverMeadow Software

The business of the cloud is booming, which is evident by aggressive year-over-year growth forecasts for cloud - estimated in the range of 18-35% growth with market projections of more than $100 billion.

(1) (1)

Technology, Cloud

Internet of Things Clouding up Existing Infrastructure

Blog-post by,
Chris Patterson

More than a decade ago, I attended a Sun Microsystems conference and remember former Chairman/CEO Scott McNealy talking about a future where a light bulb would know when it was about to die and automatically place an order for a replacement. McNealy's vision was as prescient as always (does anyone now doubt "The Network is the Computer?”), and we are slowly being surrounded by thermostats, refrigerators and bathroom scales that send data to and from the Internet.


CIO Leadership, Security

The paradox of secured access to data that matters

Balancing the security posture for your enterprise

Blog-post by,
HP Blogger
,

Recently, I encrypted my device based upon a recommended precautionary procedure.  However, I later learned that this was only meant for a select set of devices.  Of course, my device was not one of them!

(1)
   
(1) (1)

Technology, Applications, Security

Credit card hacks abound. What's going on?

We chat about this 2-3 p.m. ET today... #CIOchat

Blog-post by,
Community Manager
,

This week, it Home Depot's credit cards. A few weeks ago, it's Target's. Is any of your financial information safe? 

That's what we are discussing in today's Twitter chat. Our main question is "What does the recent spate of credit cards hacks say about the state of cybersecurity?"

The chat is from 2-3 p.m. ET, hashtag #CIOchat

(2)
   

Technology, Big Data

Changing styles of IT driven by the fashionable world of IoT

A cool bracelet from – wait for IT – Intel!

Blog-post by,
HP Blogger
,

“For most wearable makers, it would be in their best interest to stop worrying about the gizmos inside, and start worrying about the look and feel of their products -- says Nick Bilton in this New York Times article that refers to various wearables including the MICA –bracelet recently announced by Intel.&

(1) (1)

Business Issues, CIO Leadership, Security

The healthcare industry needs a new security prescription

What recent high profile PHI data breaches can teach other industries

Blog-post by,
HP Blogger
,

It’s not just hospital gowns that are exposing things best left private – it’s also data breaches.

(1)
   
(3) (3)

CIO Leadership, Security

In devices we trust – or should it be Apps?

Protect your Apps – no matter what device they run on

Blog-post by,
HP Blogger
,

“If you're been secretly watering your lawn at night during a drought emergency, then even the data on the sprinkler controller can land you in hot water if it ends up in the wrong hands,” says Maria Bledsoe, Senior Manager of HP Fortify, in this Information Week article.

(1) (1)

CIO Leadership, Technology, Cloud, Security

Protecting Your Cloud-Based Data

Challenges and Solutions for Data Access Governance on the Cloud

Blog-post by,
Roy Peretz

Moving corporate data to the cloud is a matter of when, not if in most organizations. Yours isn’t the first enterprise your cloud vendor is protecting, nor will it be the last. Circumstances don’t allow cloud vendors to say they have years of experience protecting cloud data, but they do. The average cloud vendor is protecting your data with firewalls and hardware disaster recovery, but they definitely are not covering all bases.


Business Issues, CIO Leadership, Technology, Cloud, Converged Infrastructure, IT Performance, Mobility, Security

Boost Security in the Cloud: Four Best Practices for CIOs

Blog-post by,
deisner

According to the Wall Street Journal, CIOs are increasingly called upon to be the “end point” for cloud security. Front-line IT professionals, admins and even chief security officers (CSOs) typically report to the CIO — and if CIOs don't have a clear cloud security mandate, enterprise networks are at risk. Here are four best practices for CIOs to help ensure maximum cloud security.


Technology, Security

Mobile App Assessment Shines Spotlight on Exposure Risks

Blog-post by,
michael_dager

It’s hard for most of us to imagine modern life without smartphones and tablets. The thought of being tied to a desk or laptop in order to work and play online seems a quaint notion from the distant past. Yet most of the big changes have happened in the last 5-10 years. Rapid advancements in mobile computing and mobile apps continue apace; Vision Mobile puts the worth of the global app economy at $68 billion in 2013, with a projected 2016 value of $143 billion.


Syndicate content