Bold IT leadership is crucial, but difficult to find

Bold leadership is essential for companies to achieve breakthrough performance, but according to the 2016 Deloitte Business Confidence Report, 90 percent of the 600 C-suite executives (CXOs) and C-suite executives-in-waiting (CXOWs) admit to not regularly demonstrating bold leadership.Deloitte uses six characteristics to assess bold leadership: someone who sets ambitious goals; invites feedback from colleagues at all levels of seniority; innovates and looks for new ways of doing things; proposes ideas their company might consider controversial; takes risks; and builds strong teams and empowers them to succeed. Further, 52 percent of CXOWs and 60 percent of CXOs doubt that there are enough bold leaders at the highest ranks in their company.To read this article in full or to leave a comment, please click here

Mobile management takes on apps, content

Corporate mobile infrastructures continue to grow, with both company-issued and employee-owned devices playing a key role in supporting business processes. Enterprise mobility management (EMM) suites are often the way enterprises manage these increasingly complex environments.To read this article in full or to leave a comment, please click here(Insider Story)

Mobile management vendors compared

Enterprise mobility management (EMM) helps companies secure their mobile infrastructure, as well as control device policies and manage mobile apps, content, networks and services. The platforms have been around for a while; some might know them as mobile device management (MDM) suites. But those suites have matured and adopted new features.Editor's note: This chart was originally posted in May 2013 and was updated in March 2015 and again on June 27, 2016. We chose the vendors and products listed here based on conversations with independent analysts about which have significant market share or are important to include for other reasons such as features and functions. All information in the chart about the products and services comes from the respective vendors.To read this article in full or to leave a comment, please click here(Insider Story)

Don’t let stress and a crazy pace kill your culture

Tech companies have a reputation of being high pressure and fast-paced -- especially startups. That culture can quickly erode morale as employees begin to feel the strain of the long hours and rapid, and sometimes confusing, change.A 2015 study from VitalSmarts, a leadership training company, interviewed 827 tech employees, to look at how culture affects performance in tech companies. The study identified some key ideas around culture and how it can positively or negatively affect the overall performance of the company.David Maxfield, New York Times bestselling author and vice president of research at VitalSmarts, has been conducting social science research around Fortune 500 companies for the past 30 years. Based on his research, he offer these suggestions on what needs to change in the tech world, and how to change it. But if you think improving work-place culture in tech is about building a cutting edge office or offering the best benefits, you're probably wrong.To read this article in full or to leave a comment, please click here

Report: Security teams plagued by poorly managed identity data

Security teams handling Identity and access management (IAM) are hampered by dirty data and need management help from a chief data officer, according to a new report by TechVision Research.IAM is typically defined as a “security discipline that enables the right individuals to access the right resources at the right times for the right reasons.” But identity data is riddled with errors, which ultimately raise security and privacy risks, the report says.The problems include multiple versions of employee names and titles in various systems — and even “ghost” employees. “We find a plethora of identity data challenges, including multiple authoritative sources of data, inconsistent data, redundant data, old data and misclassification of data,” the report says.To read this article in full or to leave a comment, please click here(Insider Story)

Boost your security: Get IT and HR to collaborate

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR).One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC), when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive.To read this article in full or to leave a comment, please click here

Boost your security: Get IT and HR to collaborate

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR).One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC), when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive.To read this article in full or to leave a comment, please click here

ZeroStack offers a private ‘cloud in a box’

If you’re in my age bracket, you might remember this clip of Yosemite Sam yelling at his camel to slow down. He kept yelling, “Whoa, Camel,” but the headstrong camel wouldn’t stop until Yosemite Sam jumped off and hit him on the head. (For you millennials, it used to be OK for kids to watch this stuff.)A similar trend is happening in IT today. The cloud, specifically public cloud has become all the rage. We’re moving everything to the cloud—storage, apps, compute cycles, communications tools. You name it, there’s a cloud service for it. But are we moving too fast? Should CIOs be yelling, “Whoa cloud, whoa!” And then hitting their IT architects in the head with something?To read this article in full or to leave a comment, please click here

IRS kills electronic filing PIN feature due to repeated attacks

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically.The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week.In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to obtain E-file PINs through its website.To read this article in full or to leave a comment, please click here

IRS kills electronic filing PIN feature due to repeated attacks

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically. The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week. In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to obtain E-file PINs through its website.To read this article in full or to leave a comment, please click here

New products of the week 6.27.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.eSentire Training DayKey features: The security awareness training solution combines microlearning and gamification to arm your employees against the latest social engineering, spear phishing attacks, and more. More info.To read this article in full or to leave a comment, please click here

New products of the week 6.27.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.eSentire Training DayKey features: The security awareness training solution combines microlearning and gamification to arm your employees against the latest social engineering, spear phishing attacks, and more. More info.To read this article in full or to leave a comment, please click here

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull sale of its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here