Data privacy and protection News
February 03, 2016
As organizations today move more data to the cloud, it's important to cultivate a cloud security culture and enlist a CISO, a new report shows.
January 20, 2016
A new FTC report zeroes in on the unethical use of big data. Also in Searchlight: Uber pitches customized entertainment; Google cars not yet ready for the road.
December 30, 2015
Just in time for the New Year, we've rounded up our top Searchlight columns. Read about the year's top technology stories on 2015 big data trends, Windows 10, the Apple Watch and more.
October 07, 2015
The OPM breach called into question the safety of fingerprint biometrics. What can CIOs learn from it? Plus: Google unveils latest Nexus devices; Experian hack exposes 15 million T-Mobile customers.
Data privacy and protection Get Started
Bring yourself up to speed with our introductory content
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Evaluate Data privacy and protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading
In this Startup Spotlight video, Boston-based IoT startup Digital Lumens urges CIOs to find ways to capitalize on intelligent objects -- and offers some tips on IoT security. Continue Reading
The Hadoop ecosystem is bristling with new developments, but security and governance are lacking, warn Gartner analysts Merv Adrian and Nick Heudecker. Plus notes on Apache Giraph, HaaS and the Hadoop appliance -- The Data Mill reports. Continue Reading
Manage Data privacy and protection
Learn to apply best practices and optimize your operations.
This week, Tim Cook delivered strong words on consumer privacy and how other digital companies do business. Also in Searchlight: Caitlyn Jenner beats Obama's Twitter record; Yahoo will live-stream an ESPN game. Continue Reading
Social, mobile, analytics and cloud computing require a fresh look at issues related to data ownership, according to Harvey Koeppel. His eight-point CIO checklist can help. Continue Reading
IT strategy consultant Jack Gold discusses the hows and whys of securing mobile endpoints, starting with this rule: Mobile strategy comes first. Continue Reading
Problem Solve Data privacy and protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Viva mobile BI! As this CIO implements a mobile-first strategy, it only makes sense to do the same with business intelligence products and tools. Continue Reading
The lack of a sound IT framework for managing cloud is a big hindrance to adopting cloud technologies. CEB offers CIOs a three-step remedy. Continue Reading
When it became clear she needed a BYOD policy, Dell Software CIO Carol Fawcett took a people-first-plus-tools approach that paid off. Continue Reading