What started as computer security, morphed into information security, and is now being called “information assurance.” This includes the managing of...
Security
Security: CIO Talk Network delivers Top Security Podcasts, articles, interviews, talks, blogs, events, insights and more by thought provoking I.T, Management, and Technology Leaders.
Download and listen to Best Security Podcasts now.
While most of us advocate energy efficiency and sustainability, it comes with a price tag. For one thing, links in the energy value chain such as...
IT leaders are used to thinking of IT governance as a way to optimize IT to create and deliver value. However, when economic times turn tough there...
No one is secure from the relentlessly morphing and multipronged threats facing the Internet. These threats are real and must be met with a cohesive...
There are risks inherent in all new technology. Sometimes these risks get blown out of all proportion in comparison to the advantages these new...
While each state has its own technology issues, they all face similar internal problems related to cyber security. There is also a need to create a...
Today’s IT security is only as effective as the human beings who implement and monitor it. Technology may promise self healing, intelligent...
Most innovations including virtualization, SOA, and Web 2.0 are still not fully cooked and have security vulnerabilities. Furthermore, there are more...
Software companies now release thousands of patches every year. To make the process efficient, organizations using the software are deploying patch...
Today’s IT environment is a mixed bag of legacy systems, hosted applications, and enterprise software with their own authentication and authorization...
Whether it is theft or an employee scraping off pennies out of transactions and transferring to their checking accounts, technology can play...
Sarbanes Oxley compliance is here to stay. What are organizations doing to not only get the first time certification but also monitor ongoing...
In the last decade the role of enterprise security has evolved from a departmental function to a well funded and closely watched strategic function...
The mandates related to RFID in supply chain industry has spawned many initiatives and products that claim to tackle this beast. What is a...
Security of business information is a top priority. What should businesses do to secure their information assets, optimally utilizing the scarce...