New & Notable
Enterprise information security management News
September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
August 08, 2014
The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.
June 30, 2014
Will the Internet of Things bring Cybergeddon upon us? Let's hope not, but the IoT age has arrived and CIOs should be thinking about how to protect it, say security experts from IBM and Intel.
Enterprise information security management Get Started
Bring yourself up to speed with our introductory content
Cloud economics is a fuzzy field, subject to a business' demands and constraints. Here are some best practices for getting a return on your cloud investment. Continue Reading
The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation passed by the U.S. Congress to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise, as well as improve the accuracy of ... Continue Reading
Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key. Continue Reading
Evaluate Enterprise information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
What are the financial benefits of using the cloud? Don't expect any hard-and-fast formulas. Cloud economics turn out to be a local affair, dependent on a company's business drivers and constraints -- and the ability of CIOs to understand them. Continue Reading
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Like many IT execs, O.C. Tanner CTO Niel Nickolaisen is seeking a balance between digital footprint data mining and the privacy risks it entails. Continue Reading
Manage Enterprise information security management
Learn to apply best practices and optimize your operations.
Without governance, BYOD will quickly turn into mobile chaos. SearchCIO expert Bryan Barringer lays out the fundamentals of forming a mobility governance team. Continue Reading
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager. Continue Reading
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
Problem Solve Enterprise information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Part two of SearchCIO's six tips for avoiding mobile security mistakes looks at the limitations of non-human safeguards. Continue Reading
Top security threats, recent fraud cases and the potential for human error have CIOs looking ahead to new security tools, our #CIOchat-ters say. Continue Reading
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model. Continue Reading