CIO Symmetry:

Hacking


August 13, 2012  5:59 PM

Is the social media revolution about to declare a cease fire?



Posted by: Wendy Schuchart
consumerization, corporate culture, Facebook, Hacking, IT staff development, IT staff development and retention, IT training and certification, IT workers of the future, Recruitment tips, smartphones, social media, Staffing, technology trends, women in IT

Are you tired of chasing the social media revolution? Do you wonder how Google manages to gain such fierce employee loyalty? We are too, so we've chased answers to these questions and more in our weekly blog roundup. This week, we're looking at innovation from a government perspective, tips on how...

May 10, 2012  3:46 PM

The most popular mobile OS? Hint: It’s not an Apple product



Posted by: Wendy Schuchart
Android, Apple, BYOD, Google, Hacking, mobile devices, mobile technology, mobile workforce, network security policy, Operating systems, Security, security risk, SMB security

We've scoured the Web looking for the top notes for your executive lunch break. This week, we're digging into mobile and smartphone news, including the most popular mobile device and the risks your BYOD users are facing with the latest Android malware attacks. The majority of U.S. mobile users...


April 6, 2012  2:56 PM

Will vendor relations be strained after Dell acquisitions?



Posted by: Wendy Schuchart
AppAssure Software, Cisco, Clerity, cloud applications, cloud computing, cloud security, Dell, Hacking, Hewlett-Packard, IBM, Make Technologies, security tools, SonicWall, Vendor Relationships, Vendor selection and management, Wyse Technologies

It's been a busy week for Dell, not to mention for managing CIO vendor relations. This past Tuesday, Dell announced its impending acquisition of Wyse Technology Inc., a cloud software and hardware company (and the source of one of our favorite


April 2, 2012  5:04 PM

Where are the successful women in business leadership?



Posted by: Wendy Schuchart
Amazon, big data, business continuity planning, data breach, data security, Facebook, Hacking, IBM, IT staff development, IT staff development and retention, Millennials, social media, social media tools, Staffing, Steve Jobs, women in IT

Each week, we scour the Web looking for the choicest cuts of the blogosphere. This week, we're taking a look at the illusive Millennial-generation traits that lead to a quest for more "me time" while the generation's women are experiencing job burnout. Richard Branson asks why there aren't more...


March 5, 2012  7:54 PM

Will the Apple iPad 3 release date ever get here? Do you care?



Posted by: Wendy Schuchart
Android, Apple, data privacy, Hacking, iPad, iPad 3, iPhone, mobile applications, mobile devices, Project Management, Project Management Professional, Yahoo!

We've tracked down the hottest blog posts and the best tech news that's fit for consumption. This week, we're narrowing in on the Apple iPad 3 release date, the problem with the original iPhone on the new AT&T networks, the latest work of the hacker group Anonymous and the philosophical...


February 13, 2012  5:25 PM

How free mobile apps risk personal data privacy and security



Posted by: Wendy Schuchart
Android, big data, data privacy, data security, Google, Hacking, iPhone, iPhone business apps, mobile applications, mobile devices, mobile technology, mobile tools

Each week, we scour the Web and bring you the choicest cuts for your approval. This week, we're looking at data privacy and security in the form of denial-of-service attacks, smart chatting and two free mobile apps suffering from major personal data security issues. Your team is your first line...


January 30, 2012  3:52 PM

Does anyone still care about corporate social media?



Posted by: Wendy Schuchart
Apple, Hacking, mobile applications, remote connectivity, social media, Twitter, Yahoo!

Each week, we scour the Web and collect all the best and brightest links to start your week off swinging. This week, we're looking at the latest credit card hacks, how Apple tricks its employees into keeping corporate secrets and a successful corporate social media campaign that will please all the...


August 4, 2011  11:17 PM

Intrusion testing means thinking like a hacker



Posted by: Wendy Schuchart
CIO, Hacking, security risk

Back in the '90s and early 2000s, I had two acquaintances who called themselves "hackers." Being a burgeoning geek girl myself, I kind of figured that they were affecting the moniker to be cool. Back then, the image of a hacker was different, more like the Robin Hoods of the Internet age. It was...


July 5, 2011  1:34 PM

Hacking activities mean security risk is everybody’s business



Posted by: Scot Petersen
CIO, Hacking, security risk

The LulzSec hacker group recently announced it was backing off its spree of network break-ins...


December 9, 2008  9:11 PM

Recent FBI vishing scam warning an old issue



Posted by: Kristen Caretta
CIO, Hacking, Midmarket CIO, Security, VoIP

Last Friday, the FBI issued a warning about a security vulnerability that could be used by cybercriminals to make vishing telephone scams.

Vishing (combining phishing and voice)...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: