CIO Symmetry:

cybersecurity


June 3, 2016  5:13 PM

Recent megabreaches underscore need to bridge security skills gap

Brian Holak Brian Holak Profile: Brian Holak
cybersecurity, IT Strategy

There's no doubt that cyberthreats are getting smarter and more effective, but the same can't always be said about companies' security measures. This week's discovery of the Tumblr, Myspace and Fling megabreaches -- in which more than 642 million passwords were compromised -- highlights the...

April 29, 2016  6:14 PM

Assessing hyper-converged architectures; next-gen security strategies

Brian Holak Brian Holak Profile: Brian Holak
cybersecurity, Data Center, Enterprise Security, Hyper-convergence

Hyper-convergence, a system that allows integrated technologies to be managed as a single system through a common toolset, is set to shake up the enterprise and how we think of data center economics. How should CIOs respond to the emergence of hyper-converged infrastructures? These four articles...


April 22, 2016  5:22 PM

Intel’s job cuts a sign of PC’s metamorphosis; keeping cool during a cyberassault

Brian Holak Brian Holak Profile: Brian Holak
cybersecurity, Digital disruption, GRC strategy

Intel just announced that it's cutting 12,000 jobs in a restructuring effort that shifts focus away from PCs and onto growing technologies like wearables and IoT. In this week's...

0 Comments     RSS Feed     Email a friend


April 9, 2016  5:46 PM

Microsoft jumps on blockchain bandwagon; Instagram roundup of Fusion symposium

Brian Holak Brian Holak Profile: Brian Holak
Blockchain, cybersecurity, Digital business

Blockchain, the distributed-ledger technology the cryptocurrency bitcoin is based on, is garnering a lot of attention. Although it isn't mainstream yet, that could change after this week's announcement that Microsoft is partnering with big banks to develop the technology. 


March 25, 2016  4:43 PM

Assessing biometric surveillance in Brussels’ wake; data lake implementation tips

Brian Holak Brian Holak Profile: Brian Holak
Big Data, CISO, cybersecurity, Data lake, Data privacy

With Big Brother watching, what could go wrong? Biometric surveillance is drawing attention -- and trepidation -- in the wake of the tragic terrorist attacks in Brussels. In this week's Searchlight, analysts discuss the present and future


February 12, 2016  5:23 PM

Obama’s cybersecurity plan draws muted praise; CIOs step up in mobile app delivery

Brian Holak Brian Holak Profile: Brian Holak
cybersecurity, mobile apps deployment

The federal government is stepping in to take on cyberthreats. In President Obama's new $19 billion national cybersecurity proposal, he aims to significantly beef up cybersecurity, but will it be enough to close the cyberskills gap and incite enterprise-wide change? In


December 11, 2015  5:36 PM

The struggle of innovation teams; should big tech help fight online terrorism?

Fran Sales Fran Sales Profile: Fran Sales
CDO, CIO, cybersecurity, grc, IT innovation, Startup

The mass shooting in San Bernadino, Calif., and other recent horrific acts of terrorism have spurred politicians everywhere to call for a means to make it more difficult for terrorist...

0 Comments     RSS Feed     Email a friend


November 13, 2015  8:11 PM

Gartner predicts IoT surge in 2016; why APM should focus on UX

Fran Sales Fran Sales Profile: Fran Sales
APM, CIO, Cloud Computing, cybersecurity, Internet of Things, iot, mobile app security, Mobile Application Development

The number of connected "things" in use will rise to 6.4 billion in 2016, Gartner predicted. That's a 30% rise from this year. The consultancy also said that this explosion will drive a...

0 Comments     RSS Feed     Email a friend


October 9, 2015  5:19 PM

Cloud contract essentials; notes from Gartner Symposium

Brian Holak Brian Holak Profile: Brian Holak
cloud, Cloud contract, cybersecurity, Gartner

Migrating to the cloud is a big decision with a lot of moving parts. One of the most crucial pieces is the often-dreaded cloud contract. In this two-part feature, learn best practices for negotiating a...

0 Comments     RSS Feed     Email a friend


October 2, 2015  3:04 PM

The Achilles heel of biometrics; IT outsourcing mistakes to avoid

Fran Sales Fran Sales Profile: Fran Sales
Big Data, Big Data analytics, Biometrics, CIO, corporate governance, cybersecurity, Data breach, Data governance, Digital business, Financial firms, Financial regulations, Gartner, HIPAA, Hybrid cloud, IT outsourcing, it startegy, regulatory compliance, SMB

The uniqueness of fingerprints, retinas and the other biological features that biometric authentication relies on is the security tool's greatest asset. But in light of the theft of 5.6 million fingerprints in the recent Office of Personnel Management breach, this immutability is also the...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: