Security risk management

Security risk management News

View All News

Security risk management Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Security risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Balancing user experience and mobile data security

    Creating a powerful user experience (UX) is the holy grail of mobile app development, according to SearchCIO columnist and former CIO Harvey Koeppel. But the journey there is fraught with obstacles, including managing and designing apps that appropriately handle data risks, multiple device and operating system constraints, environmental considerations, and legacy system constraints. The undoing of many journeys is a result of failing to balance UX with the "granddaddy" of all these obstacles: mobile data security risks.

    In this SearchCIO handbook, Koeppel gives an account of his own journey to harmonizing user experience and mobile data security, and offers 13 CIO pointers to help ensure your quest is a success. In our second piece, CTO Niel Nickolaisen advises IT leaders on how to take a balanced approach to mobile app development. Lastly, Senior News Writer Nicole Laskowski runs down seven UX design tips for a winning mobile app. Continue Reading

  • Leaky enterprise: Data loss tops mobile security threats

    With the absence of high-profile breaches, mobile data protection is still on the backburner at some organizations. Why it’s time to change course. Continue Reading

  • Leaky enterprise? Data loss tops mobile security threats

    Many CISOs are now in the hot seat, seeking better ways to embrace mobility while combating high-priority mobile security threats. As mobile devices become productivity tools, security professionals need to pay attention to data classification and mobile risk assessment. Failed attempts to safeguard enterprise data by banning mobile data access or locking down smartphones and tablets demonstrate a pressing need for more effective strategies against mobile security threats. We explore pitfalls to avoid and best practices that have proven effective. Learn about emerging technologies -- from containerized apps to context-aware policies -- that can help your enterprise stop costly mobile data leaks.

    Integration and better performance is the name of the game as enterprise firewalls offer greater visibility, next-generation IPS and advanced threat functionality without slowing down the network. We asked readers who plan to invest in security technology in the next the 12 months which enterprise firewalls and advanced threat detection tools made it onto their short lists. We unveil Readers’ Top Picks for enterprise firewalls from perimeter to next generation systems. We also ask them about the layers of defense, namely advanced threat detection, that they seek for these security appliances. Finally, keeping up with technology advances can become a full-time job. We ask CISOs what strategies they adopt to follow the latest tech and how they find benchmarks to determine its enterprise effectiveness. Continue Reading

View All Evaluate

Manage Security risk management

Learn to apply best practices and optimize your operations.

  • How to ensure a secure API

    Application program interfaces, or APIs, are nothing new in the IT world, but over the past ten years, public-facing APIs have risen from a handful to over 10,000. The function of APIs is to add capabilitiies to Web applications and mobile apps, allowing the automation of common processes that interact with services on other machines. APIs, in other words, let programs and websites "talk" to each other, which means APIs allow those programs and websites to provide even greater value to the end users.

    Like almost all good things in the world of IT, this raises security questions. When developers create an API, they can also inadvertently open a window to hackers. So this three-part guide looks carefully at both the nature of the security risk and also outlines best practices for managing your organization's use of outside APIs in a secure fashion, as well as making sure that any API's you make publicly available are not opening you up to attack. Continue Reading

  • Fight SAP cybersecurity risks with patches, research

    No system, not even SAP ERP, is immune to security risks -- more than 400 SAP vulnerabilities have been identified. Here are tips for battling threats to SAP cybersecurity. Continue Reading

  • How to craft an enterprise cloud change management policy

    Though few enterprises have one, a cloud change management policy can be a lifesaver when confronted with transitions and security risks. Continue Reading

View All Manage

Problem Solve Security risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve