New & Notable
Enterprise information security management News
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
August 08, 2014
The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.
June 30, 2014
Will the Internet of Things bring Cybergeddon upon us? Let's hope not, but the IoT age has arrived and CIOs should be thinking about how to protect it, say security experts from IBM and Intel.
May 20, 2014
Like many IT execs, O.C. Tanner CTO Niel Nickolaisen is seeking a balance between digital footprint data mining and the privacy risks it entails.
Enterprise information security management Get Started
Bring yourself up to speed with our introductory content
Cloud economics is a fuzzy field, subject to a business' demands and constraints. Here are some best practices for getting a return on your cloud investment. Continue Reading
Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key. Continue Reading
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Evaluate Enterprise information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
What are the financial benefits of using the cloud? Don't expect any hard-and-fast formulas. Cloud economics turn out to be a local affair, dependent on a company's business drivers and constraints -- and the ability of CIOs to understand them. Continue Reading
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
Manage Enterprise information security management
Learn to apply best practices and optimize your operations.
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager. Continue Reading
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
What can businesses' willy-nilly adoption of SaaS apps do for CIOs? Remove the invisibility cloak, and shadow apps become a golden opportunity to enable business goals, beef up security and save money. Continue Reading
Problem Solve Enterprise information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Part two of SearchCIO's six tips for avoiding mobile security mistakes looks at the limitations of non-human safeguards. Continue Reading
Top security threats, recent fraud cases and the potential for human error have CIOs looking ahead to new security tools, our #CIOchat-ters say. Continue Reading
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model. Continue Reading