Sergey Nivens - Fotolia

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

SN blogs: Cybersecurity leadership needs restructuring

SN blogs: This week, why having two CISOs could benefit cybersecurity strategy; how Google's plans to become an MVNO could be a good thing.

Enterprise Strategy Group senior analyst Jon Oltsik says that since enterprises are in the process of transforming their cybersecurity risk strategies, their ultimate plans will come down to more than just the strategies themselves. Cybersecurity leadership will play an important role in how these new action plans will be implemented and Oltsik says it's time for a new kind of chief information security officer (CISO). At this point, Oltsik explains, enterprise and governmental CISOs don't have enough skills or authority to oversee and implement strategies. Instead, Oltsik suggests a two-person team that consists of a chief security officer (CSO), who handles the business aspect of the strategy, and a chief information security technology (CISTO) officer who might not have the business chops, but who is an expert in IT security architecture and infrastructure. In other words, says Oltsik, CSOs create cybersecurity policies while CISTOs enforce cybersecurity policies.

Read more about Oltsik's two-man security leadership team idea for executing cybersecurity strategies.

Misinterpreting big data visualizations poses danger to business users

Current Analysis analyst Brad Shimmin says that big data analytics tools that provide feedback and recommendations to users might not be as helpful as they are intended to be. That's because many people do not understand different visualization tools, Shimmin explains. If, for example, a big data analysis product finds results and produces a visualization of the data, it might not be useful if the person who is reviewing those results doesn't know the difference between a box and whisker plot. Moreover, the reviewer might not know which kind of visualization is appropriate for a particular data set. He says products like IBM's Watson Analytics are attempting to fill this gap by adding heuristics -- that is, trial-and-error methodology -- machine learning and best practices into their systems. Shimmin says some handholding is necessary to help everyday business users eliminate the dangers of misinterpreting data.

Read more about the dangers of misinterpreting big data visualizations according to Shimmin.

What does Google as an MVNO mean for the enterprise?

Nemertes Research analyst Matt Craig says that Google is reportedly working on becoming a mobile virtual network operator (MVNO), running on top of T-Mobile's and Sprint's existing wireless networks. An MVNO provides wireless communications services, including voice and data to customers, over a wireless network infrastructure owned by a third-party operator. While many people are focusing on the impact this will have on the consumer, Craig says Google's move could also affect enterprise users. Google, Craig writes, has already expanded its applications to include Google for Work and its Chromebook series have made a huge impact in education. As an MVNO, Google has the potential to add communication services, a full unified communications suite and mobile services -- all in a single package that's centrally managed.

Read more of why Craig says Google as an MVNO is a big deal for the enterprise.

FTC pushes for stronger data protection laws

New York Times technology blogger Natasha Singer says that the Federal Trade Commission (FTC) is advising companies to make data protection a top priority when developing Internet of Things (IoT) products. Singer writes that even though the FTC doesn't have the legal power to enforce data privacy laws, the agency warns that consumer trust and product reliability is at stake if companies do not make privacy a top priority. "We are still at a time when we can have an impact on how the Internet of Things evolves," FTC Chairman Edith Ramirez told Singer, adding, "These important privacy principles still have a place in today's world." The agency has urged Congress to enact a federal consumer privacy law, but Singer believes it is unlikely to happen.

Read more about how data privacy and the Internet of Things could impact consumer trust.

This was last published in February 2015

Dig Deeper on Network Security Monitoring

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close