What's the top threat on the minds of global IT leaders? Employee-owned mobile devices - or BYOD (bring your own device), as the trend is known. The struggle: Do mobile device benefits outweigh the organizational risks?
How can organizations best mitigate risk and meet increasingly stringent compliance requirements in the face of infrastructure transition and pressure to control costs? The answer: Virtual and cloud-based solutions. Unfortunately, these solutions introduce significant challenges with respect to security, audit and...
As banking institutions seek tremendous cost savings from cloud infrastructure and services, two key factors must be considered: The Patriot Act, which has strict stipulations regarding access to data and where it is stored, and the protection of data -- even from third party service providers.
This webinar...
Organizations looking to improve their privacy management in the event of a breach "have to continually plan and prepare," says Nationwide's Chief Privacy Officer Kirk Herath. That means putting into writing a comprehensive plan.
See our Full Coverage of the State of Government Information Security Today 2011 survey.
President Obama declared cybersecurity a national security priority in May 2009, in effect making the IT experts at all levels of government the frontline troops defending local, state and federal information assets.
To...
Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies, has been in privacy management for more than a decade, and he has two main concerns about today's enterprise: Mobile technology and cloud computing.
The National Institute of Standards and Technology has issued a draft of its most complete guide on cloud computing, and is seeking public suggestions on how to improve the document.
The increase in the availability and quality of medical images is enabling healthcare providers to successfully diagnose and resolve more patient problems than ever before. The downside is the demand placed on IT organizations to retain numerous medical images with huge file sizes in a reliable, secure, scalable, and...
U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
When it comes to hot topics, they don't get hotter than authentication, cloud computing and IT governance - all of which I've discussed at length in recent interviews with industry thought-leaders. Let's review some highlights from these conversations.
Globally, countries and organizations now recognize the need for a unified approach for managing IT infrastructure services, says Marlin Pohlman of the Cloud Security Alliance. The trick is developing this new set of global standards.
Cloud computing helps ease the exchange of diagnostic images while maintaining adequate security, says Amy Radonich of University of California San Diego Health System.
"On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.
A focus on cost and speed, not on data protection, creates a security hole, a survey of cloud computing service providers reveals. Nearly two-thirds of providers say they aren't confident cloud apps are sufficiently secured.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.