CIO Symmetry:

cybersecurity


May 22, 2015  8:43 PM

The logistics of a ‘bossless’ workplace; dated security practices endanger companies

Brian Holak Brian Holak Profile: Brian Holak
BPM, cybersecurity, Data Center, Holacracy, Mobile payments

Imagine never having to report to a boss or supervisor again. Sounds great, right? Well, not all the employees at Zappos think so. The company's controversial new holacracy system enforces self-management instead of boss supervision and has led to a mini employee exodus. In this two-part Q&A,...

March 6, 2015  6:45 PM

Automation vs. augmentation strategy; Mobile World Congress 2015

Brian Holak Brian Holak Profile: Brian Holak
Automation, CEO, CIO, cybersecurity, iot, IT systems, Legacy systems

Knowledge workers might soon be competing with machines for jobs. In this week's Data Mill, analytics thought leader and author Tom Davenport explains the business benefits of computer augmentation and lays out

    0 Comments     RSS Feed     Email a friend


February 27, 2015  8:28 PM

Combating social engineering, BYOD security woes with education

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, Employee training, Phishing, Small and medium businesses, SMB, SMB security, Social engineering, Social engineering attacks

Think that because your business is not the size of a Target, JPMorgan Chase or Sony means that you're immune from today's breed of cyberthreats? Think again. Just because small and medium-sized businesses (SMBs) don't have the financial resources or the brand reputation many enterprises do doesn't...


January 16, 2015  7:12 PM

The emergence of containers; turning security hindsight into foresight

Brian Holak Brian Holak Profile: Brian Holak
CIO, cybersecurity, Data Science, grc, IaaS, Risk management, Security

Container software has been around for a while, but it's only just now finally having its big moment in the spotlight. In the latest SearchCIO Searchlight, Associate Site Editor Francesca Sales

    0 Comments     RSS Feed     Email a friend


October 29, 2014  5:30 PM

How building a security culture can shield you from cybercrime

Fran Sales Fran Sales Profile: Fran Sales
CIO, cybersecurity, End user security, FBI, Information security, Intellectual property theft, Security training, SMB, SMB security

You know things are getting real when the FBI and Secret Service get involved. When it comes to protecting your organization, traditional, siloed security no longer holds a candle to today's persistent cybercriminals, who still slip through the cracks, sometimes without organizations' knowledge; we...


September 5, 2014  7:09 PM

CIOs can take advantage of Apple iCloud hack; cloud BI in e-commerce

Fran Sales Fran Sales Profile: Fran Sales
Apple, Big Data, CIO, Cloud analytics, cybersecurity, Data Leakage, Data privacy, E-discovery, Governance, icloud, IT talent, Mobile, Paypal, Startup, Talent acquisition

Security experts, the media and Hollywood were thrown into a tizzy in response to the leak of celebrity nude photos in Apple's iCloud breach. For CIOs, however, the big news offers a hidden opportunity to

    0 Comments     RSS Feed     Email a friend


August 22, 2014  6:44 PM

Three digital intelligence tactics for IoT; Heartbleed hack reemerges

Fran Sales Fran Sales Profile: Fran Sales
Chief Data Officer, CIO, Collaboration, cybersecurity, Digital intelligence, E-discovery, Gartner, Heartbleed, Internet of Things, Mobile data, Mobile security

With the proliferation of Internet of Things (IoT) devices and the resultant growth in streaming data, CIOs are facing new duties and challenges. To fully take advantage of IoT, CIOs must build a "

    0 Comments     RSS Feed     Email a friend


August 15, 2014  7:58 PM

Two-speed IT at Gartner Catalyst, and which CDO role will prevail?

Fran Sales Fran Sales Profile: Fran Sales
Agile, Big Data, Chief Data Officer, Chief Digital Officer, CIO, CIO Decisions, CISO, Compliance, cybersecurity, Data Mining, Data privacy, Digital strategy, E-discovery, Gartner, Hybrid cloud, Mobile Application Development, NSA, Target data breach, Vendor management, Waterfall development

John Deere's director of enterprise architecture Mano Mannoochahr kicked off the big data discussion at this week's Gartner Catalyst Conference in San Diego, and his keynote sparked some discussion on the benefits of both waterfall and agile. Read Senior News Writer Nicole Laskowski's take on how...


August 1, 2014  8:07 PM

Mobile technology’s promises and hurdles; data governance myths, debunked

Fran Sales Fran Sales Profile: Fran Sales
Big Data, Cloud costs, Compliance, cybersecurity, IT Governance, Mobile BI, Mobile technology, Vendor management

TheĀ future of mobile personalization was the topic of a panel of mobile app experts at MassTLC's Mobile Summit last week. Read SearchCIO features writer Kristen Lee's recap of the...


July 3, 2014  7:34 PM

Prepare for IoT security, and how to develop a SaaS risk strategy

Fran Sales Fran Sales Profile: Fran Sales
BYOD, CIO, Cloud Security, cybersecurity, FCC, Forrester, Internet of Things, Net Neutrality, Risk strategies, SaaS, SaaS applications, SaaS security, Sarbanes-Oxley Act, SMB

The Internet of Things provides consumers with many conveniences, but as ASIP CTO Andy Thurai and IBM VP of product management Michael Curry cautioned CIOs at MassTLC's recent IoT conference, its massive attack surface and the lack of security standards also mean that breaches to these connected...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: