Enterprise information security management
- December 17, 2010
The WikiLeaks debacle has put a spotlight on the need for better corporate security policies and new technology approaches. But even these safeguards are no guarantee in an age where data is so ...
- October 12, 2010
A proliferation of mobile devices in the enterprise forces CIOs to reassess policies, budgets and backups for mobile data security.
- September 16, 2010
There's no turning back mobile devices' invasion of the enterprise. CIOs need to put mobile phone security policies in place to control these uninvited guests.
- September 14, 2010
The number of niche data security software solutions providers is getting smaller, and so are the choices for IT managers. HP's announcement this week to acquire ArcSight is its second security ...
- August 25, 2010
Last month's release of the incendiary Afghan War Diary by WikiLeaks raised a lot of national security questions, not the least of which is how a large, complex enterprise anticipates the human ...
- August 19, 2010
Cyber insurance should be standard for cloud computing vendors, experts say, but some providers fail to obtain it. Customers of cloud service providers need to share the risk.
- August 17, 2010
All eyes are on cloud provider liability limits as experts ponder the financial backing needed for enterprise trust.
- August 10, 2010
Before your business thinks about buying an enterprise content management system, a deep dive into records information management could be in order. Take it from CIO Laura Fucci.
- August 03, 2010
For some firms that dole out smartphones to their employees, the mobile security policy might consist of remotely wiping the phone if it's lost or stolen, or if the employee leaves the company. ...
- July 13, 2010
After moving to a supply demand model for IT, the German logistics giant Deutsche Post DHL cut its IT business expenditures by 50% and achieved better business-IT alignment.
- July 01, 2010
The world has gone mobile faster than most people expected it would, resulting in security nightmares for CIOs. It is not uncommon for roaming employees to use multiple devices to gain access to ...
- June 16, 2010
There is no clear-cut path for IT to follow when it comes to business service development. CIOs and experts share their dos and don'ts.
- June 10, 2010
Here are five tips for getting a predictive BI analytics practice off the ground.
- June 09, 2010
Attendees at a business intelligence user conference share the ways BI analytics helped them steer clear of danger zones and increase profits.
- May 20, 2010
"Is this safe?" seemed to be the first question out of everyone's mouth when a colleague of mine was handing out USB memory sticks at the recent MIT Sloan CIO Symposium. The tiny memory sticks did ...