Data privacy and protection News
December 10, 2014
Without enterprise security, mobile payment platform company LevelUp could not stay in business. Here are four components of its security strategy.
July 23, 2014
The Hadoop ecosystem is bristling with new developments, but security and governance are lacking, warn Gartner analysts Merv Adrian and Nick Heudecker. Plus notes on Apache Giraph, HaaS and the Hadoop appliance -- The Data Mill reports.
July 09, 2014
Will the Internet of Things bring Cybergeddon upon us? Let's hope not, but the IoT age has arrived and CIOs should be thinking about how to protect it, say security experts from IBM and Intel.
June 25, 2014
Who profits from a credit card data breach? It doesn't matter. It will cost CIOs and their companies big time. Also in this week's Searchlight: Amazon smartphone announcement, Netflix plea to FCC and more.
Data privacy and protection Get Started
Bring yourself up to speed with our introductory content
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Manage Data privacy and protection
Learn to apply best practices and optimize your operations.
IT strategy consultant Jack Gold discusses the hows and whys of securing mobile endpoints, starting with this rule: Mobile strategy comes first. Continue Reading
Problem Solve Data privacy and protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Viva mobile BI! As this CIO implements a mobile-first strategy, it only makes sense to do the same with business intelligence products and tools. Continue Reading
The lack of a sound IT framework for managing cloud is a big hindrance to adopting cloud technologies. CEB offers CIOs a three-step remedy. Continue Reading
When it became clear she needed a BYOD policy, Dell Software CIO Carol Fawcett took a people-first-plus-tools approach that paid off. Continue Reading