Tips
Tips
Risk and compliance strategies and best practices
-
Challenges vs. benefits of edge computing security
Organizations moving more compute to the edges of their networks must adjust how they protect and govern their data and devices. But what should you expect along the way? Continue Reading
-
6 potential blockchain limitations for enterprise use
The potential benefits of blockchain for enterprise use must be weighed against blockchain's limitations. Here are six. Continue Reading
-
4 cloud-based e-discovery strategies to target containerized data
A cloud migration requires evaluating any existing information governance programs. E-discovery in the cloud and for container-based data platforms requires a detailed strategy. Continue Reading
-
E-discovery in the cloud introduces security, compliance issues
E-discovery is still reliable for organizing and preserving data for legal compliance, but e-discovery in the cloud and container-based storage complicate governance processes. Continue Reading
-
5 open source software problems -- and how to manage them
Open source software's appeal is understandable: It's free, accessible and relatively easy to implement. But CIOs should be aware of the pitfalls. Continue Reading
-
Overcoming multi-cloud's risks, regulatory compliance challenges
Companies adopting multi-cloud data management models face numerous regulatory compliance challenges, but IT governance strategies are helping them protect disparate information. Continue Reading
-
Security practices don't have to hinder IT speed
Speed-to-market strategies shouldn't be bogged down by IT security. Here are two steps that will help CISOs adapt governance practices to support IT speed. Continue Reading
-
Quest for the best security for containers: Seven steps
Despite their name, containers are by no means impervious to threats. With their use expected to grow, the time is ripe for determining the best security for containers. Continue Reading
-
Loose coupling, tight data access minimize security risks of new tech
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help. Continue Reading
-
Engineering compliance, legal rules into mobile technology development
Legal concerns can hinder the mobility strategy of companies, but designing compliance into the front end of mobile technology development will keep both regulators and CIOs satisfied. Continue Reading
-
Changes in CISO responsibilities call for new reporting structure
CISO responsibilities are both expanding and shifting to other departments. CEB's Jeremy Bergsman sorts out the future state of IS, privacy and the risk ecosystem. Continue Reading
-
Mobile security issues and solutions
Mobile technology usage is growing just as the number of threats facing mobile data is growing. CIOs must combat mobile security issues to stay ahead in the mobile-dominated world. Continue Reading
-
Concerned about mobile vulnerabilities, CIOs add security layers
IT leaders are adding more security layers in an effort to protect against mobility threats. What tools are in their portfolios? Continue Reading
-
The best mobile security plans examine risks first, then prescribe
How do CIOs deliver the best mobile security? Take a cue from the great psychologist Abraham Maslow, says CTO Niel Nickolaisen. Continue Reading
-
Board presentations on IT risk: Don't make these five mistakes
CIO and CISO board presentations on cybersecurity are on the rise. Jeremy Bergsman of consultancy CEB explains what not to do. Continue Reading