Artikel zum Thema "IT Security" bei CIO.de

IT security pros often seen as 'innovation killers,' says ADP's IT security chief

Orlando -- The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security. » zum Artikel

Cloud availability trumps security concerns when it comes to Shadow IT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. » zum Artikel

UK IT workers still unsure about job security

UK IT workers still have significant feelings of job insecurity, despite the jobs upturn across the sector. » zum Artikel

IT Leaders Share Tips on Managing Security Risks

IT security is a tricky issue: Too much security -- or too little -- could bankrupt your company. The key is to strike the right balance. These three IT executives share their advice. » zum Artikel

Big data analytics: the future of IT security

Big data analytics tools will be crucial to enterprise security as criminals deploy faster and more sophisticated methods to steal valuable data, according to security firm RSA. » zum Artikel

Bitdefender Small Office Security: Business-ready protection for IT amateurs

Small business owners often believe their companies are immune to cybercrime. After all, why would criminals bother with guppies when they can net a whale, right Wrong. Hackers are increasingly targeting small businesses, because they typically lack the security monitoring and management capabilities of larger companies. » zum Artikel

Will Healthcare Ever Take IT Security Seriously

In the years since the HITECH Act, the number of reported healthcare data breaches has been on the rise - partly because organizations have been required to disclose breaches that, in the past, would have gone unreported and partly because healthcare IT security remains a challenge. » zum Artikel

Hacker defaces website of IT security certification body EC-Council

A hacker defaced the website of EC-Council, an organization that runs IT security training and certification programs, and claims to have obtained copies of passports of law enforcement and military officials who signed up for the organization's courses. » zum Artikel

Wann zahlt die Versicherung?

IT-Security: Wann zahlt die Versicherung? (Foto: Andrea Danti - Fotolia.com)
IT-Security: Hacker, Cracker, Datenfänger: Unternehmen können sich gegen Cyberkriminalität und Datenverlust wappnen und mögliche Schäden teilweise versichern. » zum Artikel
  • Robin Kroha
  • Stefan Sievers

How to rethink security for the new world of IT

"We shall fight on the beaches. We shall fight on the landing grounds. We shall fight in the fields and in the streets. We shall fight in the hills. We shall never surrender," said Winston Churchill in his famous June 1940 speech in the face of Nazi attacks on England. His earlier committment to the goal of victory, "however long and hard the road may be," is an apt analogy to the security battles ... » zum Artikel

IT innovation challenging security pros' knowledge, resources

Pressure from upper management and boards is pushing security pros beyond their knowledge and resources, forcing them to roll out technology that is not properly secured, experts say. » zum Artikel

More 'Snowden effect': Defense contractors tighten access for IT, security staff

IT and security managers at U.S. defense contractors say the impact of former NSA contractor Edward Snowden as the symbol of the insider threat has led to tighter security in their organizations -- and it's often meant they have less access privileges. » zum Artikel

Do ATMs running Windows XP pose a security risk You can bank on it

World-renowned IT security expert Bruce Schneier is a friend of mine. He's worked extensively with my fiance, Sean Rooney, on a couple of projects. So, beyond my career-related need to keep up with the latest IT security news, I also read Schneier's website periodically the way people look at their friends' pages on Facebook. "What's he up to lately What's on his mind" » zum Artikel

Pharmaceutical IT chief melds five cloud security companies to bolt down resource access

Having migrated his company from on-site servers and applications to a cloud-based software-as-a-service, Nathan McBride, vice president of information technology at AMAG Pharmaceuticals, is now working to influence security by getting five cloud security service providers to build what he wants. » zum Artikel

Full-time IT job security increasingly wobbly

In June, the Texas Department of Transportation shifted its IT operations to an outsourcing services firm, affecting some 300 employees. IT workers were promised six months of job security with the outsourcing firm, which has recently ended. » zum Artikel

Security Manager's Journal: Security flaw shakes faith in Apple mobile devices

Last July, I wrote about serious security vulnerabilities on the Android operating system for mobile devices, which could compromise data as well as the devices themselves, and how this led me to believe Apple phones and tablets were a better choice because they did not have the same underlying security flaws. Sadly, as with all "Apple is more secure" claims, that has proved false. » zum Artikel

Die IT-Security-Trends 2014

Was Anwender erwartet: Die IT-Security-Trends 2014 (Foto: Andrea Danti - Fotolia.com)
Was Anwender erwartet: Cloud, ByoX, Compliance, Internet der Dinge, Industrie 4.0, kritische Infrastrukturen: Die Aussichten für das kommende Jahr sind vielseitig und von einem enormen Innovationstempo bestimmt - auf Seiten der Industrie genauso wie auf Seiten des Untergrunds. » zum Artikel
  • Simon Hülsbömer
    Simon Hülsbömer
    Simon Hülsbömer verantwortet redaktionell leitend die Themenbereiche IT-Sicherheit, Web und Datenschutz. Außerdem betreut der studierte Media Producer ab und an die iPad-Ausgaben der COMPUTERWOCHE. Aufgaben als Online-News-Aushelfer, in der Traffic- und Keyword-Analyse, dem Content Management sowie die inoffizielle Funktion "redaktioneller Fußballexperte" runden sein Profil ab.

IT security chiefs can make big bucks but are they happy

The top IT security chiefs make salaries that can run over $1 million per year, but are they happy Ponemon Institute, which interviewed about 700 security professionals in the top IT security spot at their companies to find out, learned they make big bucks but the job often feels stressful and isolated. » zum Artikel

Box adds security, automation to IT admin console

Box is prepping a revamped IT administration console for its cloud storage and file sharing service that adds content management, security and workflow automation capabilities. » zum Artikel

Box adds security, automation to IT admin console

Box is prepping a revamped IT administration console for its cloud storage and file sharing service that adds content management, security and workflow automation capabilities. » zum Artikel

HK CEOs are making IT security decisions

IT security investment decisions have found their way up to the C-suite in Hong Kong, according to a survey conducted by Frost & Sullivan Southeast Asia. » zum Artikel

Shadow IT is undermining your security

Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned ... » zum Artikel

Das richtige Maß an IT-Sicherheit

Kontextsensitive Security-Policies: Das richtige Maß an IT-Sicherheit (Foto: Olivier Le Moal - Fotolia.com)
Kontextsensitive Security-Policies: Dynamische Sicherheitslösungen werten Risiken aus, passen den Schutz an und vermeiden lückenhafte oder übertriebene Sicherheitsmaßnahmen. » zum Artikel
  • Oliver Schonschek

Why we are losing the cyber security war and what we can do about it

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. » zum Artikel

Norton Internet Security 2014: Polished security suite with excellent protection

Norton Internet Security 2014 ($80 for one year of protection on up to three PCs) looks great--and it offers excellent protection against all threats. Internet Security 2014 also provides mobile security, comprehensive parental controls, and system insights, so advanced users can track their PCs' performance. But Symantec's suite isn't perfect: Its menus, settings, and features are geared a little ... » zum Artikel

Avast Internet Security (2014): short on security

Avast is a company perhaps best known for its free antivirus software. But paying for Avast Internet Security 2014 ($40 for one year of protection on one PC) will get you such premium features as a robust firewall, online banking security, and phishing and scam email protection. » zum Artikel

Google Glass fordert IT-Security heraus

Schutz vor Spionage: Google Glass fordert IT-Security heraus (Foto: Google)
Schutz vor Spionage: Mit Googles Datenbrille und Samsungs Smartwatch werden IT-Chefs neue Aufgaben bekommen. Diese wearable Devices läuten die nächste Runde in der ByoD-Spirale ("Bring your own device") ein. » zum Artikel
  • Christiane Pütter
    Christiane Pütter


    Christiane Pütter ist Journalistin aus München. Sie schreibt über IT, Business und Wissenschaft. Zu ihren Auftraggebern zählen neben CIO und Computerwoche mehrere Corporate-Publishing-Magazine, vor allem im Bereich Banken/Versicherungen.

So machen Sie Ihr Android-Gerät sicherer

App Ops Starter, Mobile Sandbox, Sophos AV: So machen Sie Ihr Android-Gerät sicherer (Foto: Android)
App Ops Starter, Mobile Sandbox, Sophos AV: Vielen Anwender ist es immer noch nicht klar: Mobiltelefone sind heute komplette Computer - mit allen Vorteilen und Gefahren. Wir zeigen Ihnen, was Sie zum Schutz Ihres Android-Smartphones tun können. » zum Artikel
  • Frank-Michael Schlede
  • Thomas Bär

Fake social media ID duped security-aware IT guys

Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows how effective social engineering attacks can be, even against technically sophisticated organizations. » zum Artikel

Just 11% of IT security professionals are women, survey finds

A new survey has found that just 11 percent of the global information security workforce are women - who still earn less than men on average - despite double-digit annual increases of people in the profession. » zum Artikel


Artikel zum Thema "IT Security" im IDG-Netzwerk
 

Orlando -- The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
UK IT workers still have significant feelings of job insecurity, despite the jobs upturn across the sector.