Sergey Nivens - Fotolia
Enterprise Strategy Group senior analyst Jon Oltsik says that since enterprises are in the process of transforming their cybersecurity risk strategies, their ultimate plans will come down to more than just the strategies themselves. Cybersecurity leadership will play an important role in how these new action plans will be implemented and Oltsik says it's time for a new kind of chief information security officer (CISO). At this point, Oltsik explains, enterprise and governmental CISOs don't have enough skills or authority to oversee and implement strategies. Instead, Oltsik suggests a two-person team that consists of a chief security officer (CSO), who handles the business aspect of the strategy, and a chief information security technology (CISTO) officer who might not have the business chops, but who is an expert in IT security architecture and infrastructure. In other words, says Oltsik, CSOs create cybersecurity policies while CISTOs enforce cybersecurity policies.
Read more about Oltsik's two-man security leadership team idea for executing cybersecurity strategies.
Misinterpreting big data visualizations poses danger to business users
Current Analysis analyst Brad Shimmin says that big data analytics tools that provide feedback and recommendations to users might not be as helpful as they are intended to be. That's because many people do not understand different visualization tools, Shimmin explains. If, for example, a big data analysis product finds results and produces a visualization of the data, it might not be useful if the person who is reviewing those results doesn't know the difference between a box and whisker plot. Moreover, the reviewer might not know which kind of visualization is appropriate for a particular data set. He says products like IBM's Watson Analytics are attempting to fill this gap by adding heuristics -- that is, trial-and-error methodology -- machine learning and best practices into their systems. Shimmin says some handholding is necessary to help everyday business users eliminate the dangers of misinterpreting data.
Read more about the dangers of misinterpreting big data visualizations according to Shimmin.
What does Google as an MVNO mean for the enterprise?
Nemertes Research analyst Matt Craig says that Google is reportedly working on becoming a mobile virtual network operator (MVNO), running on top of T-Mobile's and Sprint's existing wireless networks. An MVNO provides wireless communications services, including voice and data to customers, over a wireless network infrastructure owned by a third-party operator. While many people are focusing on the impact this will have on the consumer, Craig says Google's move could also affect enterprise users. Google, Craig writes, has already expanded its applications to include Google for Work and its Chromebook series have made a huge impact in education. As an MVNO, Google has the potential to add communication services, a full unified communications suite and mobile services -- all in a single package that's centrally managed.
Read more of why Craig says Google as an MVNO is a big deal for the enterprise.
FTC pushes for stronger data protection laws
New York Times technology blogger Natasha Singer says that the Federal Trade Commission (FTC) is advising companies to make data protection a top priority when developing Internet of Things (IoT) products. Singer writes that even though the FTC doesn't have the legal power to enforce data privacy laws, the agency warns that consumer trust and product reliability is at stake if companies do not make privacy a top priority. "We are still at a time when we can have an impact on how the Internet of Things evolves," FTC Chairman Edith Ramirez told Singer, adding, "These important privacy principles still have a place in today's world." The agency has urged Congress to enact a federal consumer privacy law, but Singer believes it is unlikely to happen.
Read more about how data privacy and the Internet of Things could impact consumer trust.
Dig Deeper on Network Security Monitoring