SECURITY

Subscribe
 

Managing Mobility Is a Major IT Challenge

Enterprise mobility presents numerous benefits: increased productivity, potential cost savings and improved employee morale. It comes with many potential risks. Between "bill shock" from uncontrolled roaming costs to user negligence causing unmanaged overages to to data loss, managing mobility can be a major challenge. With increasingly sophisticated and more frequent cyber-threats targeting... Read More »

How Social Media Puts Businesses at Risk

Organizations that do not archive content from social media platforms face significant and growing risks from their inaction, according to a white paper by Osterman Research. Twenty-six percent of organizations have had to produce content-free discovery from their enterprise social media platform, according to the paper, "Read More »

Why IT Leaders Love the Public Cloud

Remember when organizations once feared the public cloud? If only because they were concerned about data security? Well, no longer, as the vast majority of companies have migrated to the public cloud and expect to boost their presence there in the immediate future, Read More »

12 Tips for Implementing IoT Security

The internet of things (IoT) is everywhere. It's in our homes, cars, offices and most commonly around our wrists. It's changing the way factories are run, how health care is delivered and how cities operate. With an estimated 5.5 million new "things" connected each day, and an expected 6.4 billion in circulation by the end of 2016, according to Gartner research, the IoT will increasingly... Read More »

How to Prepare for Cyber-War

If you cannot see an attack, how are you expected to stop it? If you were a detective in the physical world, would you rather investigate a burglary using random photographs of what might have occurred, or by using surveillance video of the actual event? "You've heard the phrase ‘antivirus is dead,' right? That's because antivirus often relies on outdated signatures to stop attacks. AV... Read More »

Why Cloud Migration Is Still a Work in Progress

Despite the seemingly ubiquitous presence of the cloud, many organizations are still in a transitional stage when it comes to cloud adoption, according to a recent survey from Unisys. The accompanying report, titled "Read More »

Why Security Metrics Miss the Mark

A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about security metrics and posture to senior management. These executives continue to rely mainly on quantitative metrics aimed at preventing breaches.... Read More »

Why CISOs Are Left Out of Digital Transformations

Although security is often seen as a barrier to digital transformation and is either excluded or included too late, security teams can help organizations adopt new technologies, according to a new study. If engaged early in the project, security teams can contribute to the project's positive impact on revenue, employee productivity and customer service. For the online survey, "Dell Digital... Read More »

Cyber-Foes Test IT’s Mettle During the Olympics

Fans and participants aren’t the only targets of cyber-criminals during the Olympics—sponsoring businesses should also be wary of these scams.

Read More »

12 Tips for Communicating Risk to Your Board

Communicating risk posture and assessments to the highest levels of an organization is a demanding and increasingly pivotal responsibility in businesses that rely on IT. In a world of proliferating new threat vector and information risks , every CIO must be skilled in communicating the value of IT security to the business. By presenting this connection to the board, information chiefs show... Read More »

Read More From Our Security Archive »