News Stay informed about the latest enterprise technology news and product updates.

CIOs play a part in Privacy Shield; "promiscuous" users change mobile security

This week, the U.S. and the European Union approved Privacy Shield. If you haven’t already heard, it’s the set of laws that replaces Safe Harbor, the overturned laws that governed the transfer of Europeans’ data across the Atlantic. Privacy Shield has a similar aim to Safe Harbor, but it also has more specific rules, harsher penalties, and highlights data governance as a critical tool for organizations that seek to comply. In this week’s Searchlight column, features writer Jason Sparapani lays out the rules’ framework, how and why CIOs should take action, and the importance of collaboration.

If I asked you of one big think you think is reshaping how companies are securing their employees’ mobile devices, I bet the word “promiscuity” doesn’t come to mind. But this trend of “promiscuous” employees, or those who indiscriminately use their mobile devices for business and personal use along with their enablement and the convergence of mobile devices and PCs, are changing the game for mobile security. Sparapani sat down with security expert Dionisio Zumerle to get his take on exactly how. Zumerle also talks about why traditional management and security tools won’t work to secure mobile devices.

How are your fellow IT peers handling every new technology innovation and market shift? With its Information Technology Priorities Survey, TechTarget has been polling them every year since 2010 to find out. In our latest Essential Guide, we break down 385 IT professionals’ project priority lists and their IT budget and spending expectations for 2016.

Who doesn’t like free templates? We’ve updated two installments of our popular series, in which we compile a list of free, downloadable IT templates for CIOs gathered from around the web. First, take a look at a sampling of free project scope templates to help you clearly document project goals, deliverables, tasks, costs and deadlines and keep your projects on track. Then, head over to this collection of free cost-benefit analysis templates for a systematic approach to determining the risks and benefits of a project or business decision.

A group of global financial organizations have put their heads together and drafted a set of broad principles to combat infrastructure-related cyber risks. Called the “International CyberSecurity, Data and Technology Principles,” the paper urges policymakers, businesses and other stakeholders to find common ground when creating new cybersecurity standards and regulations. Find out more about the standards in this SearchCompliance FAQ.

What exactly is OPSEC? If you need a refresher on the term, we’re here to help. It stands for “operational security” and refers to the analytical process for classifying data assets and setting up the controls that are needed to protect these assets. Read the rest of the SearchCompliance definition to learn about the OPSEC five-step process.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close