This post recognizes that the demands, imperatives and needs of CIOs varies from industry to industry. We who cover the CIO space often fail to recognize that so many of the things we say come off as actionless platitudes.
Inside threats have always been identified as a top source of threats in the many infosec surveys I've seen. Who better than employees to know where real damage can be done? However, attacks are getting more varied. The 2014 Data Breach report from Verizon lists nine different types of attacks. It's a must read for an CISO.
What is the tipping point to invest in converged infrastructure? And when should you stand pat in your data centers?
We're going to try and figure that out in our Thursday Twitter chat this week. We chat 2-3 p.m. ET and the hashtag is #CIOchat .
Much has been written about the benefits of converged infrastructure - reduced complexity, faster deployments, ease of management, greater capacity and how it's more geared for cloud, Big Data and mobile.
But how much does it cost and how can you figure out the ROI?
This alarming advice was about two thirds of the way down in a post Aug. 5 from Hold Security, the Milwaukee firm which disclosed that a Russian group of hackers had stolen on the order of 1.2 billion email addresses and passwords. Being told not to panic gives most mortals a very panicky feeling.