Back to basics

Whilst I spent most of my working hours in Windows 7 and Outlook, I still return to my favourite operating system OpenBSD when I need to do serious technical work. It is simple, elegant, and secure.Installing OpenBSD/i386 5.2 in VirtualBox under Window…

2013 Security Priorities – Tweet Jam

2012 was a big year for security. Congress debated cybersecurity legislation ; social networking site LinkedIn was faulted for one of the largest security breaches in history; and global cyber espionage was a trending topic. On Tuesday, December 11, The Open Group will host a tweet jam examining the topic of IT security and what is in store for 2013. Continue reading

Data Protection Today and What’s Needed Tomorrow

Technology today allows thieves to copy sensitive data, leaving the original in place and thus avoiding detection. Published in October 2012, the Jericho Forum® Data Protection white paper reviews the state of data protection today and where it should be heading to meet tomorrow’s business needs. Continue reading

How the CIO can Sleuth Mobile Systems

Guest Post by David Nardoni The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Unfortunately, 58% of organizations do not have a CISO, according to our recent Global State of Information Security Survey of 9,300 senior executives. Often the CIO is tasked with leading efforts to collect evidence when foul play is suspected. Fetching data from mobile devices is fraught with challenges […]

Survey: Data Breaches Driving Customers Away

Guest post by Mark Lobel According to our new Global State of Information Security Survey 2013, data breaches are driving customers away from businesses around the world. In conjunction with CIO Magazine and CSO Magazine, we recently surveyed 9,300 c-Suite executives, vice presidents and directors of IT & information security from 128 countries. 52% of executives confessed they have lost customers as a result of inadequate information security. I can’t think of a more compelling […]

#ogChat Summary – The Future of BYOD

With over 400 tweets flying back and forth, last week’s BYOD Tweet Jam (#ogChat) saw a fast-paced, lively discussion on the future of the BYOD trend and its implications in the enterprise. In case you missed the conversation, here’s a recap of last w…

Optimizing ISO/IEC 27001 Using O-ISM3

Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS). Continue reading →

The Open Group Barcelona Conference – Early Bird Registration ends September 21

Early Bird registration for The Open Group Conference in Barcelona ends September 21. Register now and save! The conference runs October 22-24, 2012. On Monday, October 22, the plenary theme is “Big Data – The Next Frontier in the Enterprise,” an…

Cloud Computing and Security: Do You Know Where Your Data Is?

Migrating more data and applications to the cloud is top of CIO’s to-do list right now. 52% of the 489 business and technology executives who responded to our 2012 Digital IQ study plan to boost their spending in the private cloud this year. Those same firms are simultaneously setting their sights on the public cloud. 57% of the leadership surveyed claim they are ramping up their investments in public clouds. Understandably, security is weighing heavy […]

If you liked this, you might also like:

  1. The Era of Security Breaches
  2. Why Cloud Computing Has Legs
  3. CIO Guide to Cloud Computing