IT risk management and legal issues News
February 03, 2016
As organizations today move more data to the cloud, it's important to cultivate a cloud security culture and enlist a CISO, a new report shows.
January 20, 2016
A new FTC report zeroes in on the unethical use of big data. Also in Searchlight: Uber pitches customized entertainment; Google cars not yet ready for the road.
December 16, 2015
U.S. calls on tech giants to combat terrorist threats online. Also in SearchLight: Yahoo to split; Bitcoin founder, found and lost; Zuckerberg under fire for giving away billions.
October 07, 2015
The OPM breach called into question the safety of fingerprint biometrics. What can CIOs learn from it? Plus: Google unveils latest Nexus devices; Experian hack exposes 15 million T-Mobile customers.
IT risk management and legal issues Get Started
Bring yourself up to speed with our introductory content
Companies are eyeing data assets as the new cash cow, but monetizing data is hard to do, warn data monetization experts Lydia Jones and Karl Urich. Here's what you need to know. Continue Reading
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
Niel Nickolaisen suggests fellow IT leaders ignore the hysteria over 'mobile-first' enterprises and take a balanced approach to mobile app development. Continue Reading
Evaluate IT risk management and legal issues Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading
The cyberthreat landscape grows more dangerous by the day. Harvey Koeppel offers a 12-point cybersecurity checklist for CIOs. Continue Reading
IoT is mature enough for enterprise adoption, said a panel of experts at the 2015 MIT Sloan CIO Symposium, but successful deployments require CIOs to engage with operational technology. Continue Reading
Manage IT risk management and legal issues
Learn to apply best practices and optimize your operations.
Harvey Koeppel recounts his quest to deliver great user experience without inviting undue data risks. The journey was not easy. Continue Reading
Among the myriad evolving threats to information security, CIOs can count on one constant: Human error. Niel Nickolaisen offers three best practices for dealing with ourselves. Continue Reading
Cloud inventory management saves money, reduces security risk and helps the enterprise compete. But first, CIOs must build relationships with business decision makers. Continue Reading
Problem Solve IT risk management and legal issues Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading
The lack of a sound IT framework for managing cloud is a big hindrance to adopting cloud technologies. CEB offers CIOs a three-step remedy. Continue Reading
Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise -- starting with data governance. Continue Reading