CIO Symmetry:


October 2, 2015  3:04 PM

The Achilles heel of biometrics; IT outsourcing mistakes to avoid

Fran Sales Fran Sales Profile: Fran Sales
Big Data, Big Data analytics, Biometrics, CIO, corporate governance, cybersecurity, Data breach, Data governance, Digital business, Financial firms, Financial regulations, Gartner, HIPAA, Hybrid cloud, IT outsourcing, it startegy, regulatory compliance, SMB

The uniqueness of fingerprints, retinas and the other biological features that biometric authentication relies on is the security tool's greatest asset. But in light of the theft of 5.6 million fingerprints in the recent Office of Personnel Management breach, this immutability is also the...

September 11, 2015  8:55 PM

Apple makes another enterprise bid with iPad Pro; 5 career-ending CIO don’ts

Fran Sales Fran Sales Profile: Fran Sales
Apple, Apple iOS, BPM, CIO, Cisco, customer, cybersecurity, Data governance, Information security, ipad

As if you needed even more convincing that Apple was serious about breaking into the enterprise, here's further proof: Its business-centric iPad Pro is bigger, lasts longer and performs faster than its predecessor (and comes with a stylus, to boot). Could this be the device that gives Apple the...

August 28, 2015  8:18 PM

A CIO’s cybersecurity checklist; tech integration strategies and best practices

Ben Cole Ben Cole Profile: Ben Cole
CIO, cybersecurity, Technology

Cyberdefense has become major concern across the globe: Individuals, companies, governments and even national security are all being threatened by cybercrime. As the cyberthreat landscape grows more dangerous by the day, SearchCIO contributor Harvey Koeppel offers a 12-point

    0 Comments     RSS Feed     Email a friend

August 14, 2015  8:56 PM

News from Gartner Catalyst; Google’s Alphabet puts innovation first

Fran Sales Fran Sales Profile: Fran Sales
CIO, CIO innovation, Customer engagement, cybersecurity, Digital initiatives, Gartner, Google, Information security, Regulation SCI

Gartner research vice president Paul DeBeasi kicked off its annual Gartner Catalyst conference this week with a subversive idea: that while the technology foundation of "mobile and cloud-first, predictive and self-conductive" remains crucial, organizations are also going to need a personality...

July 2, 2015  8:45 PM

Senior leadership success in 3 steps; the CIO’s role in a platform business strategy

Fran Sales Fran Sales Profile: Fran Sales
Apple, CIO, Compliance, cybersecurity, Digital business

A stellar CIO is only as good as his direct reports. To build a leadership team of that creates breakthroughs in its industry, leadership and agility expert Joseph Flahiff argues that CIOs need to build a supportive culture in which senior IT feels confident experimenting with new ideas.

    0 Comments     RSS Feed     Email a friend

May 22, 2015  8:43 PM

The logistics of a ‘bossless’ workplace; dated security practices endanger companies

Brian Holak Brian Holak Profile: Brian Holak
BPM, cybersecurity, Data Center, Holacracy, Mobile payments

Imagine never having to report to a boss or supervisor again. Sounds great, right? Well, not all the employees at Zappos think so. The company's controversial new holacracy system enforces self-management instead of boss supervision and has led to a mini employee exodus. In this two-part Q&A,...

March 6, 2015  6:45 PM

Automation vs. augmentation strategy; Mobile World Congress 2015

Brian Holak Brian Holak Profile: Brian Holak
Automation, CEO, CIO, cybersecurity, iot, IT systems, Legacy systems

Knowledge workers might soon be competing with machines for jobs. In this week's Data Mill, analytics thought leader and author Tom Davenport explains the business benefits of computer augmentation and lays out

    0 Comments     RSS Feed     Email a friend

February 27, 2015  8:28 PM

Combating social engineering, BYOD security woes with education

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, Employee training, Phishing, Small and medium businesses, SMB, SMB security, Social engineering, Social engineering attacks

Think that because your business is not the size of a Target, JPMorgan Chase or Sony means that you're immune from today's breed of cyberthreats? Think again. Just because small and medium-sized businesses (SMBs) don't have the financial resources or the brand reputation many enterprises do doesn't...

January 16, 2015  7:12 PM

The emergence of containers; turning security hindsight into foresight

Brian Holak Brian Holak Profile: Brian Holak
CIO, cybersecurity, Data Science, grc, IaaS, Risk management, Security

Container software has been around for a while, but it's only just now finally having its big moment in the spotlight. In the latest SearchCIO Searchlight, Associate Site Editor Francesca Sales

    0 Comments     RSS Feed     Email a friend

October 29, 2014  5:30 PM

How building a security culture can shield you from cybercrime

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, End user security, FBI, Information security, Intellectual property theft, Security training, SMB, SMB security

You know things are getting real when the FBI and Secret Service get involved. When it comes to protecting your organization, traditional, siloed security no longer holds a candle to today's persistent cybercriminals, who still slip through the cracks, sometimes without organizations' knowledge; we...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: