Enterprise information security management News
January 28, 2016
As organizations today move more data to the cloud, it's important to cultivate a cloud security culture and enlist a CISO, a new report shows.
November 24, 2015
TechTarget's 2015 Annual Salary and Careers Survey results reveal how CIOs and senior IT leaders are coming to terms with shadow IT.
October 02, 2015
The OPM breach called into question the safety of fingerprint biometrics. What can CIOs learn from it? Plus: Google unveils latest Nexus devices; Experian hack exposes 15 million T-Mobile customers.
August 21, 2015
Moral questions abound after the Ashley Madison hack, but will the latest high-profile breach finally spur companies to improve consumer privacy? Also: Amazon's data-driven motivation tactics under scrutiny; Target reaches breach settlement.
Enterprise information security management Get Started
Bring yourself up to speed with our introductory content
A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information and how it is protected. Continue Reading
President Obama couldn't have put the current state of cybersecurity better: "Whether it's phishing or botnets, spyware or malware, and now ransomware, these attacks are getting more and more sophisticated every day," he said at a summit at Stanford... Continue Reading
A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable. Continue Reading
Evaluate Enterprise information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading
Creating a powerful user experience (UX) is the holy grail of mobile app development, according to SearchCIO columnist and former CIO Harvey Koeppel. But the journey there is fraught with obstacles, including managing and designing apps that ... Continue Reading
A prevention-focused security strategy isn't foolproof. CIOs need to guide a shift in IT security spending toward attack detection and response. Continue Reading
Manage Enterprise information security management
Learn to apply best practices and optimize your operations.
Internet of Things privacy and security concerns continue to stir up plenty of debate. In this photo story, SearchCIO followers weigh in on the discussion and offer up advice. Continue Reading
Cybersecurity experts urge enterprises to embrace new tools, including micro-virtualization and intelligence-led security. Continue Reading
The cyberthreat landscape grows more dangerous by the day. Harvey Koeppel offers a 12-point cybersecurity checklist for CIOs. Continue Reading
Problem Solve Enterprise information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Among the myriad evolving threats to information security, CIOs can count on one constant: Human error. Niel Nickolaisen offers three best practices for dealing with ourselves. Continue Reading
IoT is mature enough for enterprise adoption, said a panel of experts at the 2015 MIT Sloan CIO Symposium, but successful deployments require CIOs to engage with operational technology. Continue Reading
The early days of mobile computing are gone. Mobile apps continue to grow in number and complexity, and so has industry spend on mobile security, reaching almost $2 billion in 2014. Still, many experts say enterprises are significantly ... Continue Reading