The view from the top of IT with TechWorld Editor Rohan Pearce
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.
By Christian Anschuetz and Dan Abdul | 22 April, 2013 10:56
In 1995, when I was a university student in Helsinki, I developed a security protocol to protect data-in-transit as it moved throughout our network. I named it the "secure shell," or SSH for short. Today, SSH is used by organizations of all types and sizes as a secure method to move data from machine to machine and provide remote administrator access. From the perspective of an attacker or malicious insider, SSH is an artery that carries vital organizational data.
By Tatu Ylönen, CEO and founder of SSH Communications Security | 01 March, 2013 22:12
Startup Convercent officially debuted today with a software-as-a-service (SaaS) offering that lets employers make available to employees in electronic form, via computer or mobile device, the workplace ethics and compliance terms the business supports.
By Ellen Messmer | 29 January, 2013 17:02
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.
By Ellen Messmer | 10 January, 2013 13:58
Companies have a lot to gain by maintaining control of IT assets. They can avoid massive unplanned expenses, increase productivity and provide easy access to information for decision making. When designing an IT asset management (ITAM) program, keep these tips in mind.
By Brian Hollandsworth, product manager, ServiceNow | 12 December, 2012 19:23
In this whitepaper, Strategy Analytics present their findings on the security and TCO of major mobile platforms. Find out what businesses can learn from the public sector about best practice in mobile enterprise management. Click to view.