News Scan: Marriage of CMO and CIO; 5 styles of threat defense; more
>>Security pros want more government programs
In a statistic that borders on irony, two-thirds of enterprise security professionals believe the federal government should be doing more to help the private sector cope with the current cybersecurity situation and threat landscape. That is according to new research from ESG. The research firm recently surveyed security pros on what they would most like to see the government doing. Among the results: 45 percent want better ways to share federal security information; 42 percent want funding for advanced research and development around cybersecurity; 41 percent want more stringent national cybersecurity legislation.
(Read more on IT security wants: Close to half of firms do not have data governance policies, survey finds / Cybercrime costs are soaring, warns Ponemon study)
>>Digital marketing invites marriage of CMOs, CIOs
Organizations are increasingly moving marketing operations into the digital space, making the time ripe for CMOs and CIOs to form new collaborative relationships. That was the message of Gartner vice president Jennifer Beck in an online presentation reported by CIO. Beck also foresees new job roles coming out of these collaborative efforts, such as digital CMO, chief data officer and chief marketing technologist, CIO noted.
(Read more on the CMO and CIO relationship: Warm up to your CMO—he or she may be your boss soon / The CIO, CMO challenge: what does it mean for your team (and your job)?)
>>NSA taps Yahoo, Google data center links
The National Security Agency was able to penetrate the main communications link that connects Yahoo and Google data centers around the world, giving it access to the accounts of hundreds of millions of people, the IDG News Service reported. The NSA and British counterpart, GCHQ, reportedly use a tool called MUSCULAR, which enables the agencies to copy the entire data flows across fiber-optic cables carrying information between the data centers.
(Read more on the NSA surveillance efforts: Supremes asked to block challenges to NSA program / NSA revelations undermine confidence in encryption)
>>Gartner outlines five styles of threat defense
Gartner has released a new security report aimed at helping IT managers better protect their organizations against stealthy attacks, or what are often called advanced persistent threats. The report, "Five Styles of Advanced Threat Defense," categorizes the available security products in the market into five "styles" including network traffic analysis; network forensics; payload analysis; endpoint behavior analysis; and endpoint forensics. Read the full report here.