News Stay informed about the latest enterprise technology news and product updates.

Snowden talks encryption drawbacks; experts dish app consolidation tips

Is data encryption enough to ensure data protection? According to Edward Snowden, the answer is no. At Harvard University’s fourth annual Symposium on the Future of Computation in Science and Engineering, which took place last week, Snowden joined security technology expert Bruce Schneier to talk open source encryption, policies and privacy, the Data Mill reports.

Before you start consolidating your apps, get some pointers from two SearchCIO experts, Niel Nickolaisen and Harvey Koeppel. First, Nickolaisen dishes on the best ways to overcome application consolidation hurdles, including introducing data brokers and segregating activities based on purpose. Then, Koeppel shares his personal experience with application consolidation and explains how the process is not an end, but a starting point for wider business benefits.

IoT devices are great, but the personal privacy and security implications cannot be ignored, according to a new Federal Trade Commission (FTC) report. Associate Site Editor Francesca Sales highlights the report’s key findings in this week’s Searchlight. Plus: Apple breaks the bank again and Amazon gives Microsoft’s Outlook some competition.

Saving time and money is on every CIO’s mind, and, when it comes to mobile application development, that might just mean walking in your customers’ shoes, according to Nickolaisen. In this tip, Nickolaisen talks about focusing on the customer to streamline the mobile app development process.

Risk management and information governance don’t have to conflict, according to data management expert Jeffrey Ritter. In this SearchCompliance video Q&A, Ritter discusses the relationship between risk management and information governance, and what role analytics plays in alleviating risk.

Also on SearchCompliance, information security consultant J. Michael Butler chats with Site Editor Ben Cole about information security professionals’ shifting roles as data protection takes center stage within the business. Plus, in this #GRCChat recap, participants disclose what #GRC features you should keep in mind when implementing a BYOD policy.

How much do you know about SMAC governance and strategy? Review some of our recent stories on social, mobile, analytics and cloud strategy and test your knowledge with this CIO quiz.

Finally, over on the TotalCIO blog, Features Writer Kristen Lee explains how CIO attitudes are changing when it comes to software-defined networks.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.