Enterprise data privacy management
CIOs face regular enterprise data security and privacy issues as they are expected to effectively use technology to share data while still following specific rules and regulations to protect personal information. Specific data security and privacy issues include creating best practices for security and data theft prevention, setting up data privacy policies and avoiding data privacy incidents. Find the latest enterprise data security and privacy information for CIOs, including news, tips and other resources, in this topic section.
Top Stories
-
Feature
01 Jun 2023
7 must-have blockchain developer skills
Successfully navigating the many roles and responsibilities of a blockchain developer requires specialized skills ranging from cryptography, to smart contracts, to web development. Continue Reading
-
Feature
24 Feb 2023
6 must-read blockchain books for 2023
Numerous sources provide comprehensive information on blockchain fundamentals and applications. We narrowed the field to six of the most popular and diverse books available. Continue Reading
-
Feature
28 Dec 2022
8 top blockchain certification courses to pursue in 2023
Numerous blockchain certification courses are available for beginners and seasoned professionals, so we narrowed the field to some of the more diverse and comprehensive programs. Continue Reading
-
Feature
28 Jul 2022
How to secure data at rest, in use and in motion
With internal and external cyber threats on the rise, check out these tips to best protect and secure data at rest, in use and in motion. Continue Reading
-
Tip
19 Apr 2022
Why companies should make ERP security a top priority
Whether your ERP system is on premises or in the cloud, it's still vulnerable, and you need to take the right measures to secure it. Here's advice on how to do just that. Continue Reading
-
News
27 Oct 2021
Senators push for more online child privacy protections
U.S. senators expressed frustration with social media giants for not supporting specific legislation enhancing child privacy protections online. Continue Reading
-
News
22 Oct 2021
Calls for federal data privacy law grow alongside AR, VR use
A federal data privacy law would provide crucial safety guidance for development and adoption of technologies like augmented and virtual reality, according to Rep. Suzan DelBene. Continue Reading
-
Guest Post
19 Oct 2021
Building IoT strategies around trust
IoT technology can improve operational performance, safety and security, but organizations must take steps to ensure the trust of employees and customers. Continue Reading
-
News
30 Sep 2021
Differing data privacy polices challenge EU, US tech council
The EU-U.S. Trade and Technology Council plans to develop standards, address supply chain issues and define approaches to data governance, but the road ahead could be a bumpy one. Continue Reading
-
News
31 Aug 2021
Governments continue to eye data privacy, forcing CIOs to adapt
With new data privacy regulations like China's personal data protection law coming down the pike, CIOs need to make privacy and security the central focus of their overall IT strategies. Continue Reading
-
Feature
12 Aug 2021
How privacy engineers promote innovation and trust
Forward-thinking companies are hiring privacy engineers. Could your organization benefit? Uncover how these experts promote innovation and fortify customer trust. Continue Reading
-
News
14 Jun 2021
Federal data privacy legislation could benefit U.S. economy
Data privacy laws are becoming part of a 'modern economy,' according to Google's Kate Charlet, director for data governance. Continue Reading
-
Feature
15 Apr 2021
Managing cybersecurity during the pandemic and in the new digital age
Roota Almeida, CISO at Delta Dental of New Jersey and Delta Dental of Connecticut, talks about the cybersecurity threats she's seen over the last year and how she's effectively managing her security team. Continue Reading
-
Feature
30 Mar 2021
Feds debate while states act on data privacy laws
As Congress debates its next move on how to regulate big tech, states are already enacting legislation. Their push will likely serve as a model for the federal government. Continue Reading
-
News
19 Jan 2021
Data privacy law is coming, big tech privacy officers say
At the digital CES 2021 event, privacy leaders at Google, Twitter and Amazon said the time is right for a data privacy law. Continue Reading
-
News
16 Dec 2020
Social media data practices land in FTC crosshairs
The Federal Trade Commission is seeking information on how social networking giants like Facebook, Twitter and YouTube collect and use consumer data. Continue Reading
-
Opinion
18 Sep 2020
Trump's dangerous US TikTok ban
President Trump's U.S. TikTok ban over national security is resting on a vague foundation. The concern can be applied to multiple industries and products. Continue Reading
-
Tip
24 Aug 2020
The 7 elements of an enterprise cybersecurity culture
An effective 'human firewall' can prevent or mitigate many of the threats enterprises face today. Adopt these seven elements of a culture of cybersecurity to defend against risks. Continue Reading
-
Feature
19 Aug 2020
How to maintain cybersecurity remotely during the pandemic
In the second 2020 MIT Sloan CIO Digital Learning Series, a panel of IT security leaders discussed how they are keeping their organizations secure in a COVID-19 environment. Continue Reading
-
Tip
21 Jul 2020
Why IT leaders need to be aware of deepfake security risks
While IT security leaders are not yet the target of deepfake attacks, with the increased use of AI, it's important they consider how it can be of harm to the enterprise. Continue Reading
-
News
26 Jun 2020
COVID-19 tech will fail without employee privacy
Businesses can choose from a growing number of mobile apps and Wi-Fi software to protect workers from COVID-19. But tech won't succeed without top-of-the-line privacy protection. Continue Reading
-
Answer
16 Jun 2020
6 key identity and access management benefits
Identity and access management is beneficial not just for users, security and IT admins, but also enterprises as a whole. Read up on the six key advantages of an IAM framework. Continue Reading
-
Feature
04 May 2020
Former White House CIO talks cybersecurity risk mitigation
Cybersecurity expert Theresa Payton provides critical insight on current cybersecurity threats CIOs should be looking out for and how to prepare for them during and after the pandemic. Continue Reading
-
Opinion
12 Mar 2020
The future of facial recognition after the Clearview AI data breach
The company that controversially scrapes data from social media sites for law enforcement clients announced a data breach. What does it mean for the future of facial recognition? Continue Reading
-
Tip
19 Feb 2020
Who wins the security vs. privacy debate in the age of AI?
When trying to maintain balance between security and privacy in an AI-enabled world, who decides which side should tip and when? So continues the security vs. privacy debate. Continue Reading
-
Tip
24 Jan 2020
How IoT, 5G, RPA and AI are opening doors to cybersecurity threats
In the second part of a series on CIOs preparing for cyberthreats in 2020, we look at how emerging technologies like IoT and the cloud became vulnerable to cyberattacks in the last year. Continue Reading
-
Tip
14 Jan 2020
Preparing for the new forms of cybersecurity threats in 2020
In the first part of a series on the new forms of cyberthreats in 2020, we're diving into the many infiltration points being targeted today and why CIOs should be prepared. Continue Reading
-
News
09 Jan 2020
Customer experience world catches up on CCPA regulations
GDPR compliance has put many marketing, sales, e-commerce and customer service teams somewhat in line with the California Consumer Privacy Act. There are some differences, however. Continue Reading
-
Feature
08 Jan 2020
Evaluate your data governance and privacy best practices
GDPR and CCPA have put data governance in the news. With this increase in data legislation, now is a great time to review your company's data governance policies. Continue Reading
-
Tip
20 Nov 2019
IoT security regulations refocus data privacy best practices
New and old IoT regulations create a maze of rules and best practices that organizations must navigate to become more transparent about their IoT security practices. Continue Reading
-
Tip
12 Nov 2019
Risk-based digital identity benefits CIOs, CMOs and customers
Asking customers to reaffirm their digital identities by sharing private information undermines CX and data security. Instead, use a risk-based approach to digital identity. Continue Reading
-
Tip
03 Oct 2019
Challenges vs. benefits of edge computing security
Organizations moving more compute to the edges of their networks must adjust how they protect and govern their data and devices. But what should you expect along the way? Continue Reading
-
Guide
21 Aug 2019
GDPR, AI intensify privacy and data protection compliance demands
This guide covers the challenges data management teams face on data protection and privacy, particularly with the rise of GDPR and similar laws and the growing use of AI tools. Continue Reading
-
Tip
12 Aug 2019
New class of cloud security suite promises next-gen protection
Nemertes analyst John Burke points CIOs to a new type of cloud security offering that combines the functions of VPN, cloud firewall, secure web gateway and cloud access security broker. Continue Reading
-
Tip
16 Jul 2019
Facebook's Libra project -- why enterprises should prepare
Facebook's foray into cryptocurrency is setting off alarm bells in government and finance circles. The question is how could the Libra project help the enterprise? Continue Reading
-
Tip
16 Jul 2019
Ransomware attacks: How to get the upper hand
Ransomware attacks are on the rise. Can organizations play like Radiohead and refuse to pay? The answer from security experts is a qualified yes. Continue Reading
-
Feature
26 Jun 2019
Build a proactive cybersecurity approach that delivers
Whether it's zero-trust, adaptive security or just plain common sense, IT leaders must embrace an approach to IT security that's proactive, not reactive. Continue Reading
-
Feature
25 Jun 2019
Enterprises need to plan for deepfake technology
Politicians and Hollywood stars aren't the only ones at risk: Enterprises need to understand the dangers deepfakes pose to their brands and employees. Here's a primer. Continue Reading
-
News
21 May 2019
Surveillance technology under fire, amid growing societal concerns
As San Francisco halts city use of facial recognition technology, CIOs could see more regulatory actions against surveillance technology -- and more limits on their use of data. Continue Reading
-
News
17 May 2019
Trump's move to ban Huawei a wake-up call for IT execs
The Trump administration's move to effectively ban Huawei products from U.S. networks has big implications for IT execs in charge of supply chain sourcing and security. Continue Reading
-
Tip
06 May 2019
6 potential blockchain limitations for enterprise use
The potential benefits of blockchain for enterprise use must be weighed against blockchain's limitations. Here are six. Continue Reading
-
Feature
26 Apr 2019
The shift to edge computing is happening fast -- here's why
Whether you call it the Fourth Industrial Revolution or digital transformation, enterprise IT is being changed fast, and forever, and edge computing is a big reason why. Continue Reading
-
Tip
16 Apr 2019
Problems with blockchain and how they're being solved
Do you know about the blockchain trilemma? David Petersson looks at some of the problems with blockchain and how cutting-edge companies are tackling them. Continue Reading
-
Tip
12 Mar 2019
5 reasons CIO career paths go south -- and how to protect yourself
Safeguard your CIO career path. Agiloft CEO Colin Earl details the top five reasons CIOs get the ax -- and how to avoid them. Continue Reading
-
News
25 Feb 2019
UNICEF investment in 6 blockchain startups extends mission
UNICEF's investment in blockchain startups extends its mission and also underscores the particularity of scenarios where blockchain promises to be the optimal solution. Continue Reading
-
News
18 Feb 2019
Accenture predicts post-digital age where trust is the differentiator
The latest Accenture Technology Vision report calls out 'DARQ' technologies as the new must-have for CIOs and underscores the importance of building digital trust. Continue Reading
-
News
23 Jan 2019
Google GDPR fine of $57 million sets record
The Google GDPR fine of $57 million marks the first time a major tech company has been penalized under Europe's new privacy regulations. But the fine is less than the maximum allowable penalty. Continue Reading
-
News
18 Jan 2019
CIO role: Should a CIO manipulate information?
IT experts react to yesterday's report in the Wall Street Journal that a CIO used his private company to manipulate online polling data. What's that say about the CIO role? Continue Reading
-
Feature
26 Dec 2018
CCPA compliance begins with data inventory assessment
In this SearchCIO Q&A, multiple experts sound off on major questions businesses have about CCPA compliance ahead of its January 2020 enforcement date. Continue Reading
-
Feature
30 Nov 2018
The future of data security threats and protection in the enterprise
The future of data security faces new threats at an ever-increasing rate. Read one expert's advice on having a data security strategy to assess and manage enterprise data security. Continue Reading
-
News
21 Nov 2018
Backer says U.S. Internet Bill of Rights will not follow EU model
Rep. Ro Khanna is on a mission to pass regulation that would shore up data privacy rights. But he's not looking to Europe's 'overprescriptive' approach for inspiration. Continue Reading
-
News
30 Oct 2018
Gartner top 10 technology trends for 2019: A comprehensive guide
For digital-minded CIOs, Gartner's 2019 top 10 technology trends should come as no surprise: IT is getting smarter, casting an intelligent digital web over the enterprise -- and everywhere else. Continue Reading
-
Blog Post
30 Oct 2018
Cook's call: Put federal data privacy law in the spotlight
Federal data privacy law mandates have long been anathema to tech industry leaders, but Apple CEO Tim Cook's call for regulation could serve as a rallying cry for advocates of consumer's ... Continue Reading
-
Feature
19 Oct 2018
Technology risks: What CIOs should know and steps they can take
Adopting new tech helps businesses thrive, but CIOs must be aware of accompanying risks. Experts sound off on how new tech continues to muddle the cybersecurity threat landscape. Continue Reading
-
News
04 Oct 2018
Lessons learned from the Facebook security breach
As details about the Facebook data breach continue to emerge, experts sound off on what companies can do to secure what has become a prime target for hackers: user account data. Continue Reading
-
News
13 Sep 2018
Federal privacy regulations usher in the age of tech lawmakers
Big tech and privacy advocates are lobbying for dramatically different federal data privacy rights. CIOs should pay attention to whom -- and what -- the legislation seeks to regulate. Continue Reading
-
Tip
12 Sep 2018
4 GDPR strategy tips to bring IT processes up to speed
The GDPR deadline has long passed, but U.S. companies remain behind on compliance. Experts provide GDPR compliance tips to make sure IT is on the right side of the privacy rules. Continue Reading
-
Feature
31 Aug 2018
Survey: IT leaders invest to improve cybersecurity, compliance
As companies outgrow dated data protection and compliance management systems, IT leaders are making an investment in cybersecurity to avoid risk and stare down regulatory mandates. Continue Reading
-
Feature
24 Aug 2018
Mandates create new GDPR roles, processes for compliant companies
As companies tweak IT processes to maintain General Data Protection Regulation compliance, the regulation raises questions about new, privacy-centric GDPR roles and responsibilities. Continue Reading
-
Feature
24 Aug 2018
Legal 'gray areas' holding back GDPR compliance program maturity
The regulation has been in place for months, but many companies are still behind with their GDPR compliance programs. Will it take a major violation to get companies to pay attention? Continue Reading
-
Feature
21 Aug 2018
Implementing machine learning to keep Facebook user data safe
Facebook Director of Security Aanchal Gupta shares how the social media giant is implementing machine learning in security to ensure user data is safe on its platform. Continue Reading
-
Feature
17 Aug 2018
5 strategies to address the GDPR data management conundrum
As IT executives continue to wrap their heads around GDPR, strategies are emerging to ease its data management compliance burden. Here are five that are already proving effective. Continue Reading
-
Feature
17 Aug 2018
Facebook cybersecurity: How the company is building a diverse team
Facebook director of security Aanchal Gupta sounds off on the need for diverse security teams and gives an overview of how the social media giant is working to make it happen. Continue Reading
-
Feature
16 Aug 2018
How to scale security: An inside look at how Facebook does it
Facebook director of security Aanchal Gupta sounds off on how the social media giant uses automation to scale security and highlights its best practices and key focus areas. Continue Reading
-
Opinion
13 Aug 2018
Google's 'My Activity' data: Avoiding privacy and compliance risk
Google's Activity Controls create privacy and compliance risks for organizations, as well as a potential gold mine for social engineering hacks. Here's how to avoid those threats. Continue Reading
-
News
10 Aug 2018
Improving CISO-board communication: Partnership, metrics essential
With data breaches threatening the bottom line, CISO-board partnership is crucial. A new report by Kudelski Security looks at how to improve security communication with the board. Continue Reading
-
Feature
30 Jul 2018
SAP chief security officer talks cloud, security trends
Security issues are still a top concern when moving to the cloud. SAP CSO Justin Somaini highlights the questions to ask cloud providers to make sure company data is protected. Continue Reading
-
News
27 Jul 2018
Cybersecurity and physical security: Key for 'smart' venues
With sustainability being a huge driver of modern business development, protecting consumers' cyber- and physical security is an essential element when designing smart cities and venues. Continue Reading
-
News
22 Jun 2018
Convenience: Driver of BI innovation
IoT and autonomous systems expert Ella Hilal, a speaker at the upcoming Real Business Intelligence Conference, connects the dots between convenience and BI innovation. Continue Reading
-
Answer
08 Jun 2018
How can companies protect against ransomware in the cloud?
When it comes to ransomware attacks, cloud storage is not foolproof. CyberSight's Hyder Rabbani offers tips about how to address cloud ransomware threats. Continue Reading
-
Opinion
01 Jun 2018
Q&A: Why data security controls are a hard problem to solve
Feeling less friendly after Facebook? "There is a great deal of power in being able to combine data-sources," says Jay Jacobs, security data scientist. Continue Reading
-
News
31 May 2018
Enterprise cybersecurity strategy: What a CIO needs to know
Digital transformation is leaving businesses exposed to more cyberattacks. At the MIT Sloan CIO Symposium, panelists explain how much cybersecurity expertise is expected of CIOs. Continue Reading
-
Feature
30 May 2018
Blockchain as a service expected to entice CIOs to test waters
AWS' Blockchain Templates offering, along with a host of other big vendor blockchain products, will spur a 'tsunami of tests.' Blockchain adoption by business is another matter. Continue Reading
-
Feature
29 May 2018
Enterprise data encryption: Preparing for a post-quantum future
With the race toward quantum computing underway, interest in post-quantum encryption is growing. ISACA's Rob Clyde explains how CIOs and CISOs can get up to speed. Continue Reading
-
Feature
21 May 2018
CISO careers: Several factors propel high turnover
The average CISO tenure is approximately 24 to 48 months. Kudelski Security's John Hellickson discusses factors driving the high turnover rate and how to improve job satisfaction. Continue Reading
-
News
11 May 2018
Force multipliers in cybersecurity: Augmenting your security workforce
During his RSA conference keynote, IBM Security's van Zadelhoff highlighted cybersecurity's top three force multipliers and explained best practices to deploy them. Continue Reading
-
Feature
08 May 2018
CIO uses master data management to speed digitalization
IMA Financial Group CIO Michelle Vercellino's effort to clean up, protect and govern the firm's data is an important step in the firm's quest for 'data intelligence.' Continue Reading
-
Answer
04 May 2018
Best practices for cloud security: Be cognizant of what's in the cloud
In this Ask the Expert, Booz Allen Hamilton's Anil Markose offers the cloud security best practices organizations need to protect their cloud information. Continue Reading
-
News
04 May 2018
Corporate IT rebrands its modern role: Reduce complexity
The days of corporate IT as a back-end function with its practitioners relegated to the basement are long over. But IT strategy in 2018 has its own host of challenges. Continue Reading
-
News
30 Apr 2018
Top 2018 cybersecurity trends to watch out for
A glance at IT news shows cybersecurity trends remain on companies' radar. At the CIO Boston Summit, Cybereason's Jessica Stanford discussed steps to defend against risk. Continue Reading
-
Feature
23 Apr 2018
The great IoT data ownership debate
IoT is all about the data, but who owns that data? A panel at MIT Connected Things took a look at this question and found it was a tricky one to answer. Continue Reading
-
News
20 Apr 2018
Juniper CEO Rahim stresses cybersecurity training, automation at RSA 2018
During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Continue Reading
-
Feature
17 Apr 2018
Tackling security debt: The role of risk register, patch management
In this Q&A, Akamai's Dave Lewis offers pointers on how to address security debt and also discusses how organizations can avoid incurring such debt. Continue Reading
-
Feature
13 Apr 2018
Security debt: Why you should pay attention
Akamai's Dave Lewis -- a speaker at the upcoming RSA Conference 2018 -- discusses how organizations build security debt over time and its potential risks. Continue Reading
-
Feature
13 Apr 2018
Lacking data management processes holds back digital business
The business fallout of poor data management processes goes well beyond security and privacy implications. Evident IT CEO David Thomas explains in this SearchCompliance Q&A. Continue Reading
-
Answer
11 Apr 2018
How do attackers build and use phishing kits?
With attackers looking to maximize their ROI, they are employing what is called a phishing kit to run scam campaigns. In this Ask the Expert, learn how such kits are built. Continue Reading
-
Feature
06 Apr 2018
Crypto-agility: Strategies and best practices to get there
Staying crypto-agile is vital for data security. Venafi's Paul Turner discusses how to establish crypto-agility and the need for creating an inventory of cryptographic assets. Continue Reading
-
Feature
30 Mar 2018
Key elements of an effective incident response playbook
In this book excerpt, cybersecurity expert and author Bryce Austin highlights the importance of creating an effective incident response plan and delineates its key elements. Continue Reading
-
Tip
22 Mar 2018
Biometric security technology readies for corporate prime time
Companies are turning to biometric security technology to improve user authentication and experience, but its use presents unique challenges that could slow enterprise adoption. Continue Reading
-
News
20 Mar 2018
Illegitimate Facebook data harvesting may have affected elections
A whistleblower claims a company with suspicious motives exploited Facebook data harvesting to build profiles on 50 million users and influence the 2016 U.S. presidential election and Brexit vote. Continue Reading
-
Blog Post
28 Feb 2018
AI attacks are coming soon to a network near you
The rapid development of artificial intelligence and machine learning is a double-edged sword. The technologies are becoming cheaper and easier to apply to the enterprise, which is also making it ... Continue Reading
-
Answer
28 Feb 2018
Is end user training essential to data loss prevention program success?
Regulations like the GDPR promise to enforce stricter data protection rules. While a data loss prevention program can help, it requires end-user training to ease adoption. Continue Reading
-
News
27 Feb 2018
DLP implementation: Partner with the business for success
Data loss prevention strategies help prevent unauthorized disclosure of sensitive information. For a DLP strategy to be successful, however, business-wide buy-in is required. Continue Reading
-
News
16 Feb 2018
CISO responsibilities: Building a mission-based cybersecurity program
'Vanquish the enemy you can see ... then prepare for the next engagement.' Brooks Brothers' Phillip Miller gives fellow CISOs new ways to think about a cybersecurity program. Continue Reading
-
Feature
14 Aug 2017
Mitigating security risks posed by emerging tech: Expert advice
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how. Continue Reading
-
Tip
24 Aug 2016
Mobile security issues and solutions
Mobile technology usage is growing just as the number of threats facing mobile data is growing. CIOs must combat mobile security issues to stay ahead in the mobile-dominated world. Continue Reading
-
Opinion
17 May 2016
IoT data security and privacy starts now for CIOs -- and educators
IoT data security and privacy is racing to the forefront of CIO agendas. Just ask employees whose companies have doled out fitness wearables, says Niel Nickolaisen. Continue Reading
-
News
01 Dec 2014
Security licensing models hamper enterprise security
Onerous product-licensing terms imposed by security vendors raise the risk of shadow IT and threaten enterprise security, according to information security managers. Continue Reading
-
News
11 Apr 2014
'Heartbleed' bug leaks personal identifiable information
Searchlight: OpenSSL's "Heartbleed" spills personal identifiable information; how to be a better CIO; a new twist on packing tape; and more. Continue Reading
-
Blog Post
24 Jan 2014
NSA surveillance could lead to data collection policy
In case anyone wasn't aware by now, private and public entities are collecting our data. This tidbit of not-quite-news was included in President Obama's address last week on NSA surveillance ... Continue Reading
-
News
05 Aug 2013
Netflix uses the OODA loop to stay ahead of the competition
OODA loops, the death of the IT department and personal privacy. The Data Mill brings news from the Gartner Catalyst conference. Continue Reading
-
Blog Post
02 Aug 2013
The tangled Web of data privacy issues
It seems we've all been so wrapped up in where, when and how the government is spying on our communications we forgot all about how our employers do it too. In a week rife with news related to ... Continue Reading