Why CIOs should worry about the Internet of Things

Why CIOs should worry about the Internet of Things

The Internet of Things (IoT) has the promise to make everything more intelligent and efficient. Smart grids, smart meters, smart refrigerators and smart cars are just some examples that get mentioned in just about every article that gets written about IoT. But while compelling applications and innovations can come from the IoT, CIOs continue to have two legitimate major areas of concern when thinking about how the mechanics of IoT will affect their organizations: storage and security.

Stopping Data Breaches: Whose Job Is It Anyway?

Stopping Data Breaches: Whose Job Is It Anyway?

The 2015 Data Breach Investigations Report, released last month by Verizon, estimated that there were 2,122 confirmed data breaches in 2014, generating $400 million in losses.

This week we learned that one attack that was not included in this count happened in June 2014, targeting CareFirst BlueCross Blue Shield, serving 3.4 million customers in Maryland, Virginia and the District of Columbia. CareFirst only recently discovered the breach - names, birthdates, and email addresses of 1.1. million members - after putting in place new security measures.

Why the CIO must become the Chameleon In Chief

Why the CIO must become the Chameleon In Chief

The modern must act like a professional chameleon, changing their form and their IT function to suit the fast-changing business environment.

Analyst Garter suggests CIOs are fully aware that they will need to change in order to succeed in digital business, with 75 per cent of IT leaders saying they will need to adapt their style and skills during the next three years. The analyst talks of the need for executives to adopt a bi-modal stance to IT.

5 Big Data Technology Predictions for 2015

5 Big Data Technology Predictions for 2015

In just a few short years, big data technologies have gone from the realm of hype to one of the core disruptors of the new digital age. 2014 saw big data initiatives inside the enterprise increasingly move from test to production. In 2015, big data will push further into the enterprise with even more use cases - specifically real-time use cases - says John Schroeder, CEO and co-founder of Hadoop distribution specialist MapR.

Smarter IT Technology Investments

Smarter IT Technology Investments

As the budget for traditional IT infrastructure shrinks, decision makers will increasingly reallocate their funds in 2015 and beyond into cloud, mobility, and big data where they are seeing areas of growth.

Traditionally, if the back office of a business went down, or staff members had issues with their computers, IT would often come to the rescue to ensure that everything technology-related ran as smoothly as possible.

What's Top-of-Mind in Enterprise Communications

What's Top-of-Mind in Enterprise Communications

As Microsoft Lync emerges as a potential element of most enterprises' communications picture, I'm getting a real sense of deja vu. A lot of the conversations we're having about how best to implement Lync--or any of its competitors in the Unified Communications space--revolve around getting some IT people comfortable with the demands of real-time traffic, when those folks may not have dealt with such issues before.

Investment in 'Internet of Things' Security

Investment in 'Internet of Things' Security

Gartner says over 20 percent of enterprises will have digital security services for business initiatives using Internet of Things devices by 2017.

The research firm said Friday that by the end of 2017, over 20 percent of enterprises will recognize the need to protect business units which use Internet of Things (IoT) devices, and as a result, will be required to invest more heavily in security.

Chief information security officers (CISOs) are already seeing a change in the business environment due to IoT, as devices, networks and systems are becoming more interconnected on a daily basis -- and security must evolve as a response. The problem many CISOs will face is the need to blend approaches and solutions to cater for IoT security, and this may include securing mobile and cloud architecture, industrial control, automatons and physical security, according to Gartner.

C-Level Executives Seeing Big Results From Big Data

C-Level Executives Seeing Big Results From Big Data

An overwhelming majority of executives from companies that have brought big data projects to production are pleased with the results, according to new research byAccenture Digital. However, they also cite security as the major challenge they face.

"One thing we've seen in the past year is that people are not really talking about what is big data anymore," says Vince Dell'Anno, managing director and global information management lead, Accenture Analytics, part of Accenture Digital. "They've done their experimentation. They've got some understanding of it. What they're talking about now is what happens when they need to scale to support, 1,000 or 2,000 or 5,000 users. That's where challenges like security and integration come into play."