Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Top security threats, potential for human error necessitate new tools

Top security threats, recent fraud cases and the potential for human error have CIOs looking ahead to new security tools, our #CIOchat-ters say.

New security tools such as biometric authorization, mobile app containerization and cloud-based security scanning have many CIOs, CISOs and security teams squirming, asking questions like, "Where should our IT organization further focus its security budget?" and "Could hesitating subject us to the top security threats experts are warning us about, especially in light of recent retail fraud cases?"

More from this chat

Biometrics take center stage

We asked SearchCIO's February tweet jam participants about the most-pressing security threats they face, as well as security essentials that guide their efforts to ward off hackers and human error. Tweet jam participants suggested that IT organizations must reevaluate how they go about choosing security products and services:

Point solutions encompass technology that solves a single issue or a narrow IT requirement. CIO strategic advisor Tim Crawford warned IT leaders to be wary of fragile ecosystems and consider choosing security products with a suite of apps or those that integrate into legacy apps.

Crawford just might be onto something, especially as not everyone is confident in, say, cloud security:

Not every organization is vulnerable to the same kinds of security threats, but one they all have in common is the threat of human error. When it comes to using technology -- especially the newfangled stuff -- not every employee is going to catch on quickly and retain each bit of information from their security training. Brian Katz offered:

In a micro-virtualization environment, organizations set up custom policies to identify trusted processes. When an untrusted computer process happens on John Smith's computer (i.e., opening a file, clicking an email link or downloading from an unrecognized site), the untrusted operation is automatically placed in a micro VM (virtual machine) to isolate it from the computer's host system.

Micro VMs, like other topics during the #CIOChat, should certainly be on CIOs' radar, but they aren't necessarily new technologies -- just newer ideas. In a quest to learn what's coming next, managing editor Rachel Lebeaux asked participants to show off their security smarts:

So, you've got your tools. Now what? Make sure everybody in your organization knows about your security plans -- and, most importantly, respects them.

Is your organization equipped to handle new security threats? Where is your security team focusing its efforts? Tell us in the comments section below.

To read the entire conversation, search #CIOChat on Twitter. Our next tweet jam will be Wednesday, March 26, at 3 p.m. EST. Follow @SearchCIO for a topic announcement (TBA).

Dig Deeper on Risk and compliance strategies and best practices

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

What new security technologies are on the horizon for the enterprise?