The Complicated Relationship Between CIOs and CSOs

By Jack Rosenberger In the wake of the news that Target’s profit fell more than 40 percent during the fourth quarter of 2013, due in large part to a data breach that affected up to 110 million customers, CIO Insight interviewed Eric Cole, a SANS Institute Faculty Fellow and the head of SANS’s Cyber Defense…

The Complicated Relationship Between CIOs and CSOs

How can CIOs and CSOs work together better? What has made CIO-CSO relationships work in situations you’ve observed? In order for the CIO and CSO to have an effective working relationship, they must have clear boundaries of responsibility. Typically what works best is for the CSO to define the proper level of security, the CIO…

New-Gen IT Requiring CIOs to Think More Like CFOs

“It’s really incumbent upon CIOs to step it up a notch,” Gelsinger told the audience of fellow and former CIOs at the summit. “They really have to. IT systems are morphing into new entities that involve CMOs, in addition to CIOs and CTOs. The democratization of IT, thanks to the cloud and mobile devices, is…

New-Gen IT Requiring CIOs to Think More Like CFOs

By Chris Preimesberger DEL MAR, Calif. — Nobody likes to talk about the danger of their jobs evolving into something they do not like, least of all highly compensated enterprise C-suite executives. But a group of Fortune 500 CIOs did just that several days ago. The occasion was the second, and possibly annual, The Wall…

Three Flawed Issues About Cloud Computing

By Larry Bonfante When cloud computing first became the rage, a lot of IT executives who were dismissive of it as the latest fad and went back to business as usual. Now that cloud computing has made significant inroads in the marketplace, many CIOs are feeling threatened by it. They are acting defensive, using legitimate…

Get Off My Cloud: Ensuring Private Cloud Security

Incidence response Your incidence response policy covers what to do when your SIEM tool says, “Hey! We’ve got suspicious activity going on here. Do something.” Exactly what to do is outlined in detail in the incidence response policy. As a general rule of thumb, the more lax a company is on security, the better and…

Get Off My Cloud: Ensuring Private Cloud Security

[Editor’s note: This is the third article in a six-part series that looks at the primary considerations as well as the process of self-discovery that is required in the definition, development and implementation of private cloud computing. The articles were prepared by cloud experts at Logicalis, an international provider of integrated information and communications technology…

11 Reasons to Adopt Chromebook in the Enterprise

The reviews are in and they are not especially flattering. In the Wall Street Journal Walt Mossberg suggested the innovative, Google-inspired Chrome OS netbook is buggy, pricey, and just not ready for primetime. In the New York Times, tech columnist David Pogue was, if anything, more brutal; dis’ing the device (he reviewed the Samsung edition…

Hurray! IPv6 Day is Almost Here

The alarm sounded: IPv4 was running out of IP addresses. To fix the problem, IPv6, the next generation of routing, came to be with plenty of fanfare about its nearly unlimited number of addresses and additional security. There is even an official day for fanfare, “World IPv6 Day” tomorrow on June 8 (hence the timing…

Top 10 Technology Security Trends for 2011

PandaLabs, the anti-malware lab of Panda Security, put out their predictions for 2011 and, while some of it is more of the same, some metrics are actually improving — unless you count in Mac attacks (not the McDonalds’s kind), HTML5, information blackmail, 64-bit attacks … sigh. “The overall picture is not improving. Even though we…