risks

The Internet of Things Brings Far-Reaching Security Threats

By Kenneth Corbin, CIO | August 8th, 2014 Bringing new devices online at home and in the enterprise raises a host of security concerns that will require a more hands-on rethinking. WASHINGTON Security pros routinely cite poor cyber hygiene as one of their top concerns. But if they’re lying awake at night worried about lazy …

The Internet of Things Brings Far-Reaching Security Threats Read More »

Is “Bring Your Own Identity” a security risk or advantage?

By Ellen Messmer, Network World | July 28th, 2014 Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows. The “Bring Your Own Identity” (BYOID) trend in which websites let users authenticate using identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo or other means raises some …

Is “Bring Your Own Identity” a security risk or advantage? Read More »

Insecure Connections: Enterprises hacked after neglecting third-party risks

By George V. Hulme, CSO | July 28th, 2014 It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access. These weak links have certainly placed third-party security into the spotlight. As we’ve …

Insecure Connections: Enterprises hacked after neglecting third-party risks Read More »

Social, Mobile, Analytics and Cloud Outsourcing Creates New Legal Risks

By Stephanie Overby, CIO | July 25th, 2014 IT leaders need to learn how to manage the evolving legal, privacy and compliance issues of SMAC contracts. The convergence of social, mobile, analytics, and cloud technologies (SMAC) are complicating an already complex IT outsourcing value chain. But they’re also creating new legal and compliance issues for …

Social, Mobile, Analytics and Cloud Outsourcing Creates New Legal Risks Read More »