article thumbnail

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

CTOvision

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. Please sign up for this report here.

article thumbnail

GovLoop Releases Report: Winning the Cybersecurity Battle

CTOvision

By Pat Fiorenza As part of the Agency of the Future Series, GovLoop has released the report, “ Winning the Cybersecurity Battle. As a nation, we must work collaboratively to ensure that cyber defense strategies are robust and effective to secure our way of life. You can read the report online or can download a PDF here.

Report 193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Automation For The Better Good - Security

Forrester IT

However, if you asked the most diehard Luddites if they were ready willing to give up the following: Depositing a check using a mobile app. What these tasks have in common (in addition to relying on automation): a critical dependence on security. Information Security. Security Operations & Program Governance.

Security 346
article thumbnail

AT&T Becomes the Latest Company Affected by Data Breach

CTOvision

The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.

Company 268
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
article thumbnail

Fed Tech Roundup November 23

CTOvision

The Megatrend of Mobility: An update for technology decision-makers. ATARC Releases IoT Report on Emerging Technology Issues. IG: State lax on information security - FCW.com. Education Department faces tough criticism from Congress on its IT security - FCW.com. NYC builds out subway Wi-Fi access - GCN.com.

IBM 150
article thumbnail

Pay for in-demand IT skills rises fastest in 14 years

CIO Business Intelligence

Other skills with fast-rising premiums included WebSphere MQ, Apache Ant, Azure Cosmos DB, DataRobot enterprise AI platform, Tibco BusinessWorks, RedHat OpenShift, Microsoft’s System Center Virtual Machine Manager and SharePoint Server, mobile operating systems, and a clutch of SAP technologies.

SAP 126