This content is part of the Essential Guide: Managing information security amid new threats: A guide for CIOs
News Stay informed about the latest enterprise technology news and product updates.

CIOs must take aim at changing face of cyberthreats

Searchlight looks at why CIOs need to up their cyberthreat defenses. Plus: Google gets even more connected, the net neutrality ruling and more.

Soon the Targets of the world will have less room for excuses. And the same will be true for your company. If the promise of some next-gen startups pans out, the face of cybersecurity will change, and it's a good thing too. The face of cyberthreats has been morphing for years.

Hot on the heels of revelations about major data privacy breaches involving more than 100 million customers (or about one-third of the U.S. population) of Target and Neiman Marcus comes this week's lead Searchlight item. A timely piece by New York Times tech writer Nicole Perlroth takes a look at the quickly growing crop of cybersecurity startup companies intent on nudging out the stalwart Symantecs and McAfees of the market.

What sets these upstarts apart from the old-school providers, notes Perlroth, is they don't sit back and wait for hackers to come knocking; rather than react to cyberthreats, they anticipate them. Some focus on very specific of-the-moment issues companies are facing, such as keeping watch on apps downloaded to corporate networks through unsanctioned devices. Venture capitalists are eating it up and putting their money down.

Hackers can and will hack anything. And now that just about everything is connected to the Internet (or will be), anything really is going to be vulnerable. This week brought the first reported hacking of a refrigerator -- holy leftover mackerel!

Even if you don't jump on board with one of these new-breed security startups, the ideas behind what they're trying to sell you are worth thinking about. And yet many CIOs are not. In the Gartner 2014 CIO Agenda report released this week, among the approximately 2,300 global CIOs surveyed, security ranked eighth out of 12 top spending priorities for the year. Eighth.

Maybe security isn't as sexy as things like analytics (No. 1) or cloud (No. 5) -- making it a harder sell come budget time. But when something technology-related goes very wrong, it's usually the person in charge of the technology (hello, CIO) who gets shown the door (so long, CIO).

Every high-profile breach is a chance to broach the conversation about getting up to date on security -- with your CISO, CEO and especially your board of directors. The message needs to get through before the hackers do.

  • Security startups focus on eliminating modern cyberthreats; how about you?
  • No need to answer the preceding question, Starbucks; it's pretty clear where you're at on the issue.
  • Google pays $3.2 billion cash for Nest, because the overlords needed another way to monitor and influence your habits. We've got advertisers selling popsicles -- crank it up!
  • Silly Google, it's not like you need to be connected to a network to look in on what people are doing -- just ask the NSA.
  • A breakdown of what this week's net neutrality ruling means for the average American -- don't worry: it's concise and it won't use much bandwidth.
  • Everyone loves a good infographic, but sometimes data visualization tricks us with those pretty, pretty pictures. Here's a handy guide to keep from being duped.

Let us know what you think about the story; email

Next Steps

Video: The role of the CIO in cybersecurity

Can big data and personal privacy coexist?

CIO lessons from Facebook's use of data discovery tools

Dig Deeper on Enterprise data privacy management

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

Do think your company is well-protected from cyberthreats?
SafelyLocked, LLC is an emerging player in the Secure File Sharing & Collaboration space and uniquely different from most of the consumer grade providers of these services such as DropBox, Box, ShareFile, etc. Our patent-pending solutions do not rely on SSL or any other network solution for securing the data in motion. In our environment, the data is hard encrypted before it leaves the device and can only be decrypted by the recipient - we have zero knowledge of the unencrypted content, the unencrypted keys or passphrases. Our solutions have been rigorously test by 3rd party security firms and determined to be as secure as we advertise. I know this is an unsolicited promotion, but we are certainly worth checking out!