News

Enterprise information security management

  • February 23, 2015 23 Feb'15

    RASP helps apps protect themselves, but is it ready for the enterprise?

    A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.

  • February 04, 2015 04 Feb'15

    Desperately seeking security

    Your enterprise is probably no further than six degrees of separation from a damaging data breach. In CIO Decisions ezine, find out how those seeking security can turn hindsight into actionable intelligence.

  • January 30, 2015 30 Jan'15

    Snowden talks encryption drawbacks; experts dish app consolidation tips

    Is data encryption enough to ensure data protection? According to Edward Snowden, the answer is no. At Harvard University's fourth annual Symposium on the Future of Computation in Science and ...

  • January 30, 2015 30 Jan'15

    FTC sounds the alarm on IoT privacy

    There are almost 5 billion IoT devices in use -- and counting. To reap their rewards, says the FTC, focus on consumer privacy, not just security. Also in Searchlight: Apple's quarter earnings make history; Amazon breaks into business email with ...

  • January 16, 2015 16 Jan'15

    The emergence of containers; turning security hindsight into foresight

    Container software has been around for a while, but it's only just now finally having its big moment in the spotlight. In the latest SearchCIO Searchlight, Associate Site Editor Francesca Sales ...

  • December 22, 2014 22 Dec'14

    IDC 2015 security predictions: How to keep up with the bad guys

    As 2014 draws to a close, security is at the forefront of everyone's minds. The most recent unsettling security incident is North Korea's alleged involvement in the Sony data breach and ...

  • December 19, 2014 19 Dec'14

    North Korea behind Sony attack -- what now?

    The FBI pointed to North Korea as the culprit behind the Sony Pictures security breach, and reports hint the foreign government may have gotten inside help. Also on Searchlight: Yahoo CEO Marissa Mayer's flawed attempts to channel Steve Jobs; ...

  • December 12, 2014 12 Dec'14

    How is the Sony hack different from other attacks?

    The Sony data breach marks a new and scary frontier in corporate cyberwarfare. Also in Searchlight: Apple and IBM alliance bears fruit; the downfall of Pirate Bay.

  • December 01, 2014 01 Dec'14

    LevelUp CFO shares four tips on digital data safety

    Without enterprise security, mobile payment platform company LevelUp could not stay in business. Here are four components of its security strategy.

  • December 01, 2014 01 Dec'14

    Breach response plan is a must for enterprise security

    As data breaches mount, the C-suite is being pressed to take part in enterprise security. At the MIT Sloan CFO Summit, top financial, legal and security experts imparted advice.

  • September 05, 2014 05 Sep'14

    Use Apple iCloud hack to sell employees on security culture

    Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.

  • August 15, 2014 15 Aug'14

    While SpiderOak canary defies NSA, CIOs ponder their privacy bind

    CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.

  • August 08, 2014 08 Aug'14

    Use Russian hackers to demand better security

    The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.

  • June 20, 2014 20 Jun'14

    The costs of payment card data breaches could include your job

    By now, everyone and their mother knows about the massive financial damage that payment card data breaches wreak upon companies and their consumers, in the form of replacing credit cards, credit ...

  • May 20, 2014 20 May'14

    The digital footprint: Business boon vs. privacy bane

    Like many IT execs, O.C. Tanner CTO Niel Nickolaisen is seeking a balance between digital footprint data mining and the privacy risks it entails.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close