CIO Symmetry:

cybersecurity


August 28, 2015  8:18 PM

A CIO’s cybersecurity checklist; tech integration strategies and best practices

Ben Cole Ben Cole Profile: Ben Cole
CIO, cybersecurity, Technology

Cyberdefense has become major concern across the globe: Individuals, companies, governments and even national security are all being threatened by cybercrime. As the cyberthreat landscape grows more dangerous by the day, SearchCIO contributor Harvey Koeppel offers a 12-point

    0 Comments     RSS Feed     Email a friend

August 14, 2015  8:56 PM

News from Gartner Catalyst; Google’s Alphabet puts innovation first

Fran Sales Fran Sales Profile: Fran Sales
CIO, CIO innovation, Customer engagement, cybersecurity, Digital initiatives, Gartner, Google, Information security, Regulation SCI

Gartner research vice president Paul DeBeasi kicked off its annual Gartner Catalyst conference this week with a subversive idea: that while the technology foundation of "mobile and cloud-first, predictive and self-conductive" remains crucial, organizations are also going to need a personality...


July 2, 2015  8:45 PM

Senior leadership success in 3 steps; the CIO’s role in a platform business strategy

Fran Sales Fran Sales Profile: Fran Sales
Apple, CIO, Compliance, cybersecurity, Digital business

A stellar CIO is only as good as his direct reports. To build a leadership team of that creates breakthroughs in its industry, leadership and agility expert Joseph Flahiff argues that CIOs need to build a supportive culture in which senior IT feels confident experimenting with new ideas.

    0 Comments     RSS Feed     Email a friend


May 22, 2015  8:43 PM

The logistics of a ‘bossless’ workplace; dated security practices endanger companies

Brian Holak Brian Holak Profile: Brian Holak
BPM, cybersecurity, Data Center, Holacracy, Mobile payments

Imagine never having to report to a boss or supervisor again. Sounds great, right? Well, not all the employees at Zappos think so. The company's controversial new holacracy system enforces self-management instead of boss supervision and has led to a mini employee exodus. In this two-part Q&A,...


March 6, 2015  6:45 PM

Automation vs. augmentation strategy; Mobile World Congress 2015

Brian Holak Brian Holak Profile: Brian Holak
Automation, CEO, CIO, cybersecurity, iot, IT systems, Legacy systems

Knowledge workers might soon be competing with machines for jobs. In this week's Data Mill, analytics thought leader and author Tom Davenport explains the business benefits of computer augmentation and lays out

    0 Comments     RSS Feed     Email a friend


February 27, 2015  8:28 PM

Combating social engineering, BYOD security woes with education

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, Employee training, Phishing, Small and medium businesses, SMB, SMB security, Social engineering, Social engineering attacks

Think that because your business is not the size of a Target, JPMorgan Chase or Sony means that you're immune from today's breed of cyberthreats? Think again. Just because small and medium-sized businesses (SMBs) don't have the financial resources or the brand reputation many enterprises do doesn't...


January 16, 2015  7:12 PM

The emergence of containers; turning security hindsight into foresight

Brian Holak Brian Holak Profile: Brian Holak
CIO, cybersecurity, Data Science, grc, IaaS, Risk management, Security

Container software has been around for a while, but it's only just now finally having its big moment in the spotlight. In the latest SearchCIO Searchlight, Associate Site Editor Francesca Sales

    0 Comments     RSS Feed     Email a friend


October 29, 2014  5:30 PM

How building a security culture can shield you from cybercrime

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, End user security, FBI, Information security, Intellectual property theft, Security training, SMB, SMB security

You know things are getting real when the FBI and Secret Service get involved. When it comes to protecting your organization, traditional, siloed security no longer holds a candle to today's persistent cybercriminals, who still slip through the cracks, sometimes without organizations' knowledge; we...


September 5, 2014  7:09 PM

CIOs can take advantage of Apple iCloud hack; cloud BI in e-commerce

Fran Sales Fran Sales Profile: Fran Sales
Apple, Big Data, CIO, Cloud analytics, cybersecurity, Data Leakage, Data privacy, E-discovery, Governance, icloud, IT talent, Mobile, Paypal, Startup, Talent acquisition

Security experts, the media and Hollywood were thrown into a tizzy in response to the leak of celebrity nude photos in Apple's iCloud breach. For CIOs, however, the big news offers a hidden opportunity to

    0 Comments     RSS Feed     Email a friend


August 22, 2014  6:44 PM

Three digital intelligence tactics for IoT; Heartbleed hack reemerges

Fran Sales Fran Sales Profile: Fran Sales
Chief Data Officer, CIO, Collaboration, cybersecurity, Digital intelligence, E-discovery, Gartner, Heartbleed, Internet of Things, Mobile data, Mobile security

With the proliferation of Internet of Things (IoT) devices and the resultant growth in streaming data, CIOs are facing new duties and challenges. To fully take advantage of IoT, CIOs must build a "

    0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: