Latest Content tagged with Security
Page 1 / 2   >   >>
3 Larger Lessons From Heartbleed
Sara Peters  
4/10/2014   16 comments
The new OpenSSL vulnerability raises questions about online trust, open-source security, and vulnerability disclosure practices.
E2 Video: Tablet Management for Secure Mobility Solutions
Sara Peters  
4/4/2014   13 comments
Join E2 video on Monday, April 7, at 2:00 p.m. ET (11:00 a.m. PT) to learn how to deploy tablet solutions that are secure enough to protect PII and sturdy enough to protect themselves from the hazards of everyday student activities.
CIOs Considering Tech, Sourcing Overhauls
Susan Nunziata  
3/24/2014   16 comments
There are a variety of forces -- both technological and geopolitical -- that point toward many CIOs making wholesale changes in the near future.
3 Ways to Handle Pervasive Internet Monitoring
Andrew Froehlich  
3/18/2014   26 comments
The W3C and IAB are offering tips on how to handle continued spying.
Monday Comic: Anti-Social Engineering
Brian Moore  
3/17/2014   32 comments
A little laugh to start your work week.
Government Cybersecurity Initiatives Are 'Squishy'
Sara Peters  
3/13/2014   7 comments
Measuring the success of the president's critical infrastructure framework is not an exact science, and that's OK.
Snowden at SXSW: Privacy, Intellectual Property & Tech
Susan Nunziata  
3/11/2014   17 comments
Edward J. Snowden stressed that, rather than undertaking a massive information-gathering effort, the U.S. government needs to be doing more to protect intellectual property.
Target Seeks New CIO, Chief Compliance Officer
Sara Peters  
3/6/2014   28 comments
Your service providers' failures could jeopardize your security and your job.
Security: The Department of 'Go Ahead'
Sara Peters  
2/28/2014   44 comments
Information security doesn't have to be the "Department of No."
Swimming in the Data Lake
Curtis Franklin Jr.  
2/28/2014   28 comments
A data lake might be the key to better security and more useful information for your enterprise.
Vendor Lockdown
Andrew Froehlich  
2/28/2014   34 comments
Don't let your vendor be the cause of your breach.
Cybersecurity Funding: CISOs Share Their Top Tips
Susan Nunziata  
2/27/2014   19 comments
"Once business leaders understand that the cybersecurity problem is going away when crime goes away, then we'll all be on the same sheet," says one CISO.
E2 Radio: An Interop Preview With Glenn Evans
Curtis Franklin Jr.  
2/25/2014   7 comments
Get the latest information on the InteropNet in this special episode of E2 Radio.
Using Big Data to Predict Big Problems
David Wagner  
2/20/2014   19 comments
Governments and enterprises will soon be able to use big data to predict social unrest.
Smart Lighting for Retail & Manufacturing
David Wagner  
2/19/2014   26 comments
LED Broadband or Li-Fi could be an excellent networking alternative for retailers and manufacturers.
Incorporating Security Into Change Management
Andrew Froehlich  
2/18/2014   10 comments
Too often security is a once-a-year process at audit time.
IT Disasters: Lessons From the Insurance Industry
Sara Peters  
2/13/2014   24 comments
Could catastrophe bonds that protect against natural disasters also work for protecting against IT disasters?
Big Data & Advanced Persistent Threat Mitigation
Andrew Froehlich  
2/11/2014   16 comments
Big data can help defend your enterprise from the most sophisticated attacks out there.
Federal, State CIOs Face Uphill Battle
Susan Nunziata  
2/10/2014   12 comments
There are major tactical obstacles to be overcome before strategic collaboration and innovation amongst government agencies becomes a reality.
EU Data Protection Regulation To Harm Indian IT
Sudha Nagaraj Bharadwaj  
2/7/2014   18 comments
While India can rejoice over the harmonization of data protection laws in the EU, restrictions on the free flow of information may be a new barrier to trade.
Prism Not so Bad?
David Wagner  
1/29/2014   53 comments
Numbers are coming out about domestic spying and they are surprisingly low.
Copy & Paste a Major Healthcare Problem
Brien Posey  
1/22/2014   51 comments
Innocuous as it is, cut and paste can be a real problem.
The Virtual Slowdown
Curtis Franklin Jr.  
1/17/2014   31 comments
Enterprises are rushing to virtualize everything. It might be time to tap the brakes.
Malware Exploiting Cloud Providers
Sara Peters  
1/16/2014   30 comments
Cybercriminals are using legitimate, popular, enterprise-level cloud services providers to host malware.
CIO Priorities: The E2 Poll Wrap
Curtis Franklin Jr.  
1/15/2014   5 comments
E2 community members have strong opinions about the CIO's priorities for 2014, but the opinions are not all the same.
Monday Comic: BYOD Nightmares
Brian Moore  
1/13/2014   37 comments
A little laugh to start your work week.
Security on Auto Drive
Curtis Franklin Jr.  
1/10/2014   18 comments
The cars in your parking lot may be your next big security vulnerability.
Preparing to Dismiss an IT Employee
Brien Posey  
1/9/2014   43 comments
A CIO talks about how you can safely get rid of an employee.
2014 Will Be the Year of CYOD
Brien Posey  
1/7/2014   22 comments
Choose Your Own Device will replace BYOD.
Predictions for 2014
David Wagner  
12/31/2013   73 comments
Some predictions for 2014 for all areas of IT.
Protecting Clinical Environments Against Social Engineering Attacks
Brien Posey  
12/31/2013   16 comments
Clinicians and exectuives who don't think security rules apply to them are a major issue for healthcare providers.
Poll Wrap: Holiday Shopping IT Policies
Sara Peters  
12/19/2013   25 comments
Less than 18 percent of respondents to the last E2 poll said that their companies outright forbid online shopping from corporate devices.
Poll: CIO Priorities for 2014
David Wagner  
12/18/2013   17 comments
Take our poll on the top priorities for 2014.
You're Under Attack
Curtis Franklin Jr.  
12/6/2013   18 comments
Criminals are using BGP to attack your network, and there's not much you can do about it.
Watching the Bosses
Curtis Franklin Jr.  
12/4/2013   35 comments
Online monitoring is coming to the executive suite and the arguments have already begun.
Amazon to Use Drones to Deliver
David Wagner  
12/3/2013   96 comments
Amazon is considering delivering products by drone.
Security Starts With Choosing the Data You Protect
David Wagner  
11/5/2013   21 comments
Trying to figure out what to keep and why.
10 Spookiest Privacy Breaches
Sara Peters  
10/30/2013   42 comments
Here's a collection of some that will send a shiver down your spine – those that are of devastating scope, shocking deviance, or just plain creepy.
WiFi Key to Real-Time Location Services in Hospitals
Brian T. Horowitz  
10/30/2013   24 comments
RTLS needs dense WiFi and needs to be built into processes to work as advertised.
Monday Comic: Trick or Treat
Brian Moore  
10/28/2013   28 comments
A little laugh to start your work week.
India's Growing Cybercrime Problem
Sudha Nagaraj Bharadwaj  
10/25/2013   37 comments
Enterprises need to be aware of India's rising cybercrime status.
Tablet-Hacking Students Are Future Employees
Aaron Weiss  
10/22/2013   47 comments
What enterprises can learn from what these kids did to their tablets.
Intel Seeks to Change the Economics of IT Security
Michael Vizard  
10/15/2013   2 comments
Integrating security into hardware may help make security cheaper.
Passwords May Never Die for Legal Reasons
Joe Stanganelli  
10/10/2013   62 comments
Companies and individuals looking to protect secure data from the government may find passwords more attractive.
7 Surprises From CIOs & CTOs at Interop
Sara Peters  
10/9/2013   11 comments
Some of the key takeaways from Interop were highly unexpected.
India Joins EU to Guard Against Cloud Surveillance
Sudha Nagaraj Bharadwaj  
10/9/2013   14 comments
The EU and India, among others, are going to make it hard on US cloud companies.
Poll: Will A Government Shutdown Shut You Down?
Sara Peters  
9/30/2013   28 comments
If the federal government shuts down, how will you continue business?
Poll Wrap: DNS Hijacking's Worst Threat
Sara Peters  
9/30/2013   10 comments
According to the results of the last E2 poll, the E2 community is most worried that DNS hijacking will cause data breaches.
Insider Threats Are Your Fault
Sara Peters  
9/27/2013   110 comments
If we didn't ask so much of employees, maybe we wouldn't need to be fearful of them breaking corporate IT policies.
Preventing Email-Based Data Leakage in Healthcare
Brien Posey  
9/26/2013   29 comments
Using Data Loss Prevention as a backup to common sense security.
Page 1 / 2   >   >>

Latest Blogs
Sudha Nagaraj Bharadwaj   4/18/2014   0 comments
India will soon offer reliable, affordable, and efficient cloud services for the private sector through a unique government-private sector joint effort. With an eye on helping the micro, ...
Andrew Froehlich   4/16/2014   12 comments
With news that Google slashed the price of their big-data offering "Big Query" by up to 85 percent, one has to wonder if the move is to ward off competitors -- or simply that the ...
Brien Posey   4/15/2014   18 comments
Being a CIO is a tough job, but the job can be even tougher if you have a department manager who is just a little too aggressive toward you or the staff. Fortunately, there are some ...
Susan Nunziata   4/14/2014   13 comments
If you're looking for more than conjecture to back up the point that IT is increasingly crucial to the business, you'll find what you need in the report "The Gartner CEO and Senior ...
Brian Moore   4/14/2014   23 comments
Just in time for the warmer weather..."
Latest Archived Broadcast
We talk with Bernard Golden about accelerating application delivery in the cloud.
On-demand Video with Chat
Register for this video discussion to learn how tablets can provide true business usability and productivity.
4/23/2014 - Dell Compellent performance and features make it an outstanding storage platform for SQL Server. Register for this webinar now.
E2 IT Migration Zones
IT Migration Zone - UK
Why PowerShell Is Important
Reduce the Windows 8 Footprint for VDI
Rethinking Storage Management
IT Migration Zone - FR
SQL Server : 240 To de mémoire flash pour votre data warehouse
Quand Office vient booster les revenus Cloud et Android de Microsoft
Windows Phone : Nokia veut davantage d'applications (et les utilisateurs aussi)
IT Migration Zone - DE
Cloud Computing: Warum Unternehmen trotz NSA auf die „private“ Wolke setzen sollten
Cloud Computing bleibt Wachstumsmarkt – Windows Azure ist Vorreiter
Like Us on Facebook
Twitter Feed
Enterprise Efficiency Twitter Feed
Site Moderators Wanted
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail:
Dell's Efficiency Modeling Tool
The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise.

Read the full report
The State of Enterprise Efficiency in the Virtual Era: Virtualization – Smart Approaches to Maximize Gains
Virtualization is a presence in nearly all enterprise data centers. But not all companies are using it to its best effect. Learn the common characteristics of success, what barriers companies face, and how to get the most from your efforts.

Read the full report
Informed CIO: Dollars & Sense: Virtual Desktop Infrastructure
Cut through the VDI hype and get the full picture -- including ROI and the impact on your Data Center -- to make an informed decision about your virtual desktop infrastructure deployments.

Read the full report
A Video Case Study – Translational Genomics Research Institute
e2 Video

On the Case
TGen IT: Where We're Going Next

7|11|12   |   08:12   |   10 comments

Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
On the Case
Better Care Through Better Communications

6|6|12   |   02:24   |   12 comments

The achievements of the TGen/Dell project could improve how all people receive healthcare, because they are creating ways to improve end-to-end communication of medical data.
On the Case
TGen IT: Where We Are Now

5|15|12   |   06:58   |   5 comments

TGen is breaking new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions.
On the Case
TGen IT: Where We Were

4|27|12   |   06:45   |   10 comments

The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
On the Case
1,200% Faster

4|18|12   |   02:27   |   12 comments

Through their partnership, Dell and TGen have increased the speed of TGen’s medical research by 1,200 percent.
On the Case
IT May Improve Children's Chances of Survival

4|17|12   |   02:12   |   8 comments

IT is helping medical researchers reach breakthroughs in a way and pace never seen before.
On the Case
Medical Advances in the Cloud

4|10|12   |   1:25   |   5 comments

TGen and Dell are pushing the boundaries of computing, and harnessing the power of the cloud to improve healthcare.
On the Case
TGen: Living the Mission

4|9|12   |   2:25   |   3 comments

TGen's CIO puts the organizational mission at the heart of everything the IT staff does.
On the Case
TGen Speeding Up Biomedical Research to Save More Lives

4|5|12   |   1:59   |   8 comments

The Translational Genomics Research Institute is revamping its computing to improve speed, storage, and collaboration – and, most importantly, to save lives.
On the Case
Computing Power Helping to Save Children's Lives

3|28|12   |   2:13   |   3 comments

The Translational Genomics Institute’s partnership with Dell is enabling them to treat kids with neuroblastoma more quickly and save more lives.
Tom Nolle
The Big Reason to Use Office

3|18|14   |   02:24   |   16 comments

Office and personal productivity tools come in a first-class and coach flavor set, but what makes the difference is primarily little things that most users won't encounter. What's the big issue in using something other than Office, and can you get around it?
E2 Editors
SPONSORED: Mobile Security — A Use Case

3|4|14   |   04:27   |   6 comments

New mobile security solutions can accommodate a wide array of needs, including those of a complex university environment.
Tom Nolle
Killing Net Neutrality Might Save You Money

1|16|14   |   2:13   |   11 comments

The DC Court of Appeals voided most of the Neutrality Order, and whatever it might mean for the Internet overall, it might mean better and cheaper Internet VPNs for businesses.
Tom Nolle
The Internet of Everythinguseful

1|10|14   |   2:18   |   19 comments

We really don't want an "Internet of Everything" but even building an Internet of Everythinguseful means setting some ground rules to insure there's value in the process and that costs and risks are minimized.
Tom Nolle
Maturing Google Chrome

12|30|13   |   2.18   |   25 comments

Google's Chrome OS has a lot of potential value and a lot of recent press, but it still needs something to make it more than a thin client. It needs cloud integration, it needs extended APIs via web services, and it needs to suck it up and support a hard drive.
Sara Peters
No More Cookie-Cutter IT

12|23|13   |   03.58   |   21 comments

Creating the right combination of technology, people, and processes for your IT organization is a lot like baking Christmas cookies.
Sara Peters
Smart Wigs Not a Smart Idea

12|5|13   |   3:01   |   46 comments

Sony is seeking a patent for wigs that contain computing devices.
Tom Nolle
Cloud in the Wild

12|4|13   |   02:23   |   15 comments

On a recent African trip I saw examples of the value of the cloud in developing nations, for educational and community development programs. We could build on this, but not only in developing economies, because these same programs are often under-supported even in first-world countries.
E2 Editors
SPONSORED: Is Malware Evading Your IPS?

11|18|13   |   03:16   |   4 comments

Intrusion prevention software is supposed to detect and block malware intrusions, but clever malware authors can evade your IPS in these five main ways.
Sara Peters
Where Have All the Mentors Gone?

9|27|13   |   3:15   |   38 comments

A good professional mentor can change your life for the better... but where do you find one?
Tom Nolle
SDN Wars & You Could Win

9|17|13   |   2:10   |   5 comments

VMware's debate with Cisco on SDN might finally create a fusion between an SDN view that's all about software and another that's all about network equipment. That would be good for every enterprise considering the cloud and SDN.
Ivan Schneider
The Future of the Smart Watch

9|12|13   |   3:19   |   39 comments

Wearing a bulky, oversized watch is good training for the next phase in wristwatches: the Internet-enabled, connected watch. Why the smartphone-tethered connected watch makes sense, plus Ivan demos an entirely new concept for the "smart watch."
Tom Nolle
Cutting Your Cloud Storage Costs

9|4|13   |   2:06   |   3 comments

Cloud storage costs are determined primarily by the rate at which files are changed and the possibility of concurrent access/update. If you can structure your storage use to optimize these factors you can cut costs, perhaps to zero.
Sara Peters
Do CIOs Need an IT Background?

8|29|13   |   2:11   |   23 comments

Most of the CIOs interviewed in the How to Become a CIO series did not start their careers as IT professionals. So is an IT background essential?
Ivan Schneider
The Internet Loves Birthdays

8|27|13   |   3:25   |   69 comments

The Internet has evolved into a machine for drumming up a chorus of "Happy Birthday" messages, from family, friends, friends of friends who you added on Facebook, random people that you circled on G+, and increasingly, automated bots. Enough already.