search online

Wednesday, June 4, 2014

What your CFO needs to know about cloud security

IT Strategy Digest
Content from TechTarget's global network for CIOs and IT Leaders | June 4, 2014
TechTarget
FEATURED STORY

Five questions your CFOs are asking about security and risk management

Nicole Laskowski, Senior News Writer

At the MIT Sloan CIO Symposium, CIOs peppered a panel of security experts on how to establish security in a SaaS world. (SearchCIO.com)

Advertisement
NEWS
 
The 'futurescape' of global sourcing
The World BPO/ITO Forum this week focused on reinventing global sourcing, and included Vishal Ahluwalia's take on offshoring trends. (SearchCIO.com)
 
Apple buys Beats and teaches CIOs how to get ahead
It's official: Apple buys Beats from Dr. Dre. Also in Searchlight, Google diversity report reveals the uncomfortable truth and the IoT gets a high valuation. (SearchCIO.com)
 
Cloud-based security software opens floodgates for IT innovation
For Robert Jimenez, a modest investment in cloud security software paved the way for IT innovation. (SearchCIO.com)
 
Fog computing: Paradigm shift or same old, same old?
Experts predict that in the future, computing and storage of data will happen closer to the ground in the "fog" by necessity. Find out how fog computing can help CIOs tackle the Internet of Things. (SearchCIO.com)
EXPERT ADVICE
 

Retailers' DIY approach to online reputation management pays dividends

Two retailers find a DIY approach to online reputation management pleases customers and helps address underlying business issues. (SearchCIO.com)
 
CIOs trumpet top-down digital enterprise security

In a world where digital enterprise consumers connect apace and data is currency, CIOs and compliance officers find they must take a proactive security approach. (SearchCompliance.com)

 
Are you ready to move to cloud computing?
Review our recent coverage of cloud computing examples, advantages and challenges, and take our CIO quiz to see if you're ready to make the leap. (SearchCIO.com)
 
CSO: System logging a vital computer security tool
In this video interview, Tenable Network Security CSO Marcus Ranum discusses why system logging and continuous monitoring should play a bigger role in computer security strategy. (SearchCompliance.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from IT Strategy Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget CIO and IT Management Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2014 TechTarget. All rights reserved.
TechTarget

No comments :

Post a Comment