New & Notable
Enterprise information security management News
September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
August 08, 2014
The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.
June 30, 2014
Will the Internet of Things bring Cybergeddon upon us? Let's hope not, but the IoT age has arrived and CIOs should be thinking about how to protect it, say security experts from IBM and Intel.
Enterprise information security management Get Started
Bring yourself up to speed with our introductory content
Field-level encryption is the ability to encrypt data based on entire fields. Continue Reading
Cloud economics is a fuzzy field, subject to a business' demands and constraints. Here are some best practices for getting a return on your cloud investment. Continue Reading
The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation passed by the U.S. Congress to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise, as well as improve the accuracy of ... Continue Reading
Evaluate Enterprise information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
What are the financial benefits of using the cloud? Don't expect any hard-and-fast formulas. Cloud economics turn out to be a local affair, dependent on a company's business drivers and constraints -- and the ability of CIOs to understand them. Continue Reading
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Like many IT execs, O.C. Tanner CTO Niel Nickolaisen is seeking a balance between digital footprint data mining and the privacy risks it entails. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Use Of Solution: I worked on version 5 and then 6 for a total of 6 years. My personal score is 4 stars based on my experience with the latest...Continue Reading
Support can retrieve salient logging data from massive distributed systems in seconds but deployment is not easy.Powered by IT Central Station
I've been using Splunk for over 3 years now. The most valuable feature for me is alerting. Using Splunk, production support teams can retrieve...Continue Reading
I've evaluated Splunk and IBM Q1 but LogLogic is the best choice for log management. SIEM funcionailty needs improvementPowered by IT Central Station
Rating: If considering only the log management functionality (collecting, storing, search engine, reporting, alerting, etc.), I would give it...Continue Reading
Manage Enterprise information security management
Learn to apply best practices and optimize your operations.
How stalwart is your information security strategy, exactly? Can it handle today's particularly malicious variety of security threats? Take our quiz to find out. Continue Reading
The security management hierarchy in most organizations isn't conducive to breach prevention, says Dr. Eric Cole. He explains the critical changes needed to empower CISOs in this month's Security That Works column. Continue Reading
Without governance, BYOD will quickly turn into mobile chaos. SearchCIO expert Bryan Barringer lays out the fundamentals of forming a mobility governance team. Continue Reading
Problem Solve Enterprise information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Part two of SearchCIO's six tips for avoiding mobile security mistakes looks at the limitations of non-human safeguards. Continue Reading
Top security threats, recent fraud cases and the potential for human error have CIOs looking ahead to new security tools, our #CIOchat-ters say. Continue Reading
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model. Continue Reading