Remove Big Data Remove Malware Remove Policies Remove Programming
article thumbnail

DOE’s secret weapon: Supercomputers, Developers Scramble to Build NSA-Proof Email and more

CTOvision

. “I think that’s a certainty,” said Jim Lewis, a senior fellow with the Center for Strategic and International Studies and the director of the Technology and Public Policy Program.’ Via The Hill, more here. Via The Hill, more here. Via Net Security, more here. ” Via FedScoop, more here.

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Spanning a wide range of malicious activities from destructive malware and denial of service attacks, to the theft of intellectual property and even espionage, cyber threats pose a significant risk to any business. Policies: In many cases an organization's security policies and procedures can be improved to help mitigate insider risks.

How To 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Trends in 2014: Actionable Insights For Your Career

CTOvision

2014 marks a decade of major shifts within the tech and cyber security industry, fueled by Big Data, mobile, cloud computing, BYOD, and interconnected communities, bringing with it exponential change, complexity, advancement and risk. Big Data—Data center systems spending will rise to $143 billion from $140 billion.

Trends 255
article thumbnail

Ownership Issues - A Screw's Loose

A Screw's Loose

This is the crux of every issue that comes with most BYOD programs. You have to realize that most companies gravitate towards BYOD programs because they believe they can save money. When you get started with your mobile program you have to create policy. There is no difference between these two models. Great article!

Mobile 65
article thumbnail

Pots of Gold - A Screw's Loose

A Screw's Loose

They spend a lot of time and effort trying to cobble programs together to support BYOD initiatives that haven’t been well thought out. It is usually in response to an IT department clamping down via policy on what’s allowed and employees rebelling by finding ways around the policy, even if that means they could be fired.

Mobile 77
article thumbnail

Eating Elephants - A Screw's Loose

A Screw's Loose

Most organizations, when they decide that they should institute an ILM program, spend the majority of their time coming up with the classifications of their data. They set up different committees to look at the data that they have and work up how to classify the data into different categories. Uncategorized. Innovation.

Mobile 62
article thumbnail

The CTO made me do it - A Screw's Loose

A Screw's Loose

The secret sauce for BYOD is an AUP (Acceptable Use policy), but you still need the same policy if they are corporate owned devices. The goal at the end of the day is to craft a program that enables people to get their work done the most efficient and productive way possible. You need to involve and partner with everyone.

CTO 70