Bob Violino

Author Archives: Bob Violino

Chief Risk Officers needed to battle rising corporate espionage

A growing number of organizations are adding a new member to the C-suite—the chief risk officer (CRO)—and the rise of these executives is having a direct impact on the security programs at enterprises.“Corporate espionage, terrorism and cyber attacks are ratcheting up the need for senior executives who understand all aspects of risk management and security,” says Jeremy King, president of Benchmark Executive Search, a provider of technology executive search services.INSIDER 12 habits of successful tech CEO “Many companies are finally awakening to how destructive security breaches of all types can be—from physical damage and real costs to reputation loss and customer recovery,” King says. “Previously siloed risk-management functions must be reinvented, strengthened, and funded more aggressively. Industry must re-evaluate its approach to risk management, and success will require unprecedented cooperation from board directors and those in the C-suite.”To read this article in full or to leave a comment, please click here

7 steps to biometric bliss

Every time you access your phone via fingerprint reader, you’re using biometric identification technology. So, while biometrics on the consumer side has become commonplace, a number of barriers have blocked widespread biometric adoption in the enterprise.To read this article in full or to leave a comment, please click here(Insider Story)

How an audit can shore up your security strategy

Information security audits are on the rise, as organizations look to not only bolster their security postures, but demonstrate their efforts to other parties such as regulators.Audits, which are measurable technical assessments of systems, applications and other IT components, can involve any number of manual and automated processes. Whether conducted by internal auditors or outside consultants, they are an effective way for companies to evaluate where they stand in terms of protecting data resources.The high-profile data breaches of recent years have forced many organizations to take a closer look at their security technologies and policies, experts say.To read this article in full or to leave a comment, please click here

Identifying the security pitfalls in SDN

Software-defined networks can be a boon to savvy organizations, offering opportunities to cut administrative costs while increasing network agility. But SDN technology can also create security risks, and how you manage those risks can mean the difference between a successful implementation and a disastrous one.To read this article in full or to leave a comment, please click here(Insider Story)

Overcoming stubborn execs for security sake

Even with the greater awareness for strong security within organizations—and the high-profile hacks that have contributed to that increased awareness—security executives still encounter significant hurdles in doing their jobs to protect data and systems.Clashes with senior business executives as well as those at lower levels of organizations make it more challenging for CSOs and CISOs to create a secure environment, and yet they continue to happen.Many of the conflicts that occur between security and business executives are due to ongoing philosophical differences regarding risk, says Dave Dalva, vice president at Stroz Friedberg, who has worked in the position of CISO for a number of clients.To read this article in full or to leave a comment, please click here

What security pros want for the new year

It’s that time of year when we ask security executives in a variety of industries what they would like to include on their holiday wish lists.Some of the responses we received were in the realm of pure fantasy. For example, one security chief asked for technology tools that address all of the major security threats, don’t cost anything and have top-notch 7x24x365 support with response times inside 15 minutes!+ ALSO ON NETWORK WORLD Follow all of our predictions for 2016 +Most of the wishes submitted are a bit closer to reality, and some might even come true if factors align the right way. So, with the completion of another year approaching, once again we present a listing of what security executives say they are hoping for, as they continue in their mission to protect their organizations’ systems and data.To read this article in full or to leave a comment, please click here

It’s time to pull the trigger on security automation

It’s likely that you already have a variety of security tools -- intrusion prevention, network access control, endpoint security, mobile device management – that come with automation capabilities designed to quickly find and stop attacks. But for a variety of perfectly good reasons, you’ve been reluctant to turn these features on. You may be worried about blocking legitimate business transactions by mistake, keeping employees from getting work done because their devices have been temporarily quarantined or risking the wrath of users when wiping remote devices. Or maybe you’ve been so swamped that you haven’t had the time to set up these automation capabilities. “It takes time and skills to tune these products effectively in order to take advantage of their automation capabilities,” says Jon Oltsik, senior principal analyst at Enterprise Strategy Group. “Furthermore, automation usually depends upon integrating several security technologies together, which can be difficult,” Oltsik adds.To read this article in full or to leave a comment, please click here(Insider Story)

MDM features and functions compared

Mobile device management tools are transforming into enterprise mobility management (EMM), which includes app and data security, among many other things. And while all the major offerings in this arena cover the basics when it comes to hardware management, there are differences when it comes to some of the extended features you may require.To read this article in full or to leave a comment, please click here(Insider Story)