Posted on 23rd Apr 2013 by Michelle Leech
Back in 2012, our research into CIOs’ attitudes towards security threw up some interesting insights into IT leaders’ attitudes towards BYOD (Bring Your Own Device). Now, almost a year on, a new Gemalto study has shed further light on the BYOD phenomenon: this time from the point-of-view of employees. In a whitepaper, entitled ‘The Weakest […]
Posted on 23rd Jan 2013 by Gemalto
In the final installment of our series of examining CIOs’ attitudes towards security, we turn our attention to France. Perhaps the most striking aspect of France’s attitudes towards IT security is the power wielded by CIOs themselves. 70% of French respondents said that the CIO took responsibility for IT security within their organization – higher […]
Posted on 17th Aug 2012 by Gemalto
As part of our recent look at CIOs’ views on all things security, we asked the world’s IT leaders for their views on virtualization. As one of the most successful technologies of recent years, virtualization was simply too big a subject to ignore. It is commonly accepted that virtualization brings with it some element of […]
Posted on 24th Jul 2012 by Gemalto
In the latest of our posts looking at results of our recent CIO Research project we’re focusing the debate of security versus convenience. Many still consider the two to be mutually exclusive, but does this necessarily need to be the case? I blogged on this topic back in March, following a similar article by Per […]
Posted on 11th Jul 2012 by Gemalto
The next in our series of blog posts looking at the security issues affecting CIOs in the modern era focuses on the rise of personal internet devices being used at work. In fact, there’s a good chance you’re reading this post on a personal device, perhaps on an enterprise internet connection? It’s something we’re all […]
Posted on 9th Jul 2012 by Gemalto
Chief Information Officers are always faced with the same balancing act when it comes to security. On the one hand, they must maintain sufficient control over their IT resources to protect assets and sensitive data, while on the other hand, they must ensure controls are not so stringent that employees are discouraged from embracing IT and technological innovation, or attempt to bypass them completely.
Posted on 28th Jun 2012 by Gemalto
Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the results of our research into the attitudes of CIOs. Next on our agenda is the above question from Ardaman Kohli. It’s true that it doesn’t matter how secure CIOs themselves […]
Posted on 21st Sep 2011 by Gemalto
We’re shortly going to be researching CIOs globally on their views on security and authentication. What their concerns and pressure points are, what the barriers to implementing stronger security seem to be and where responsibility for security sits within an organization. However, we’d like YOU to pose the questions.
What would you ask?