CIO Symmetry:

Risk management


April 16, 2012  6:13 PM

Don’t let reduction of compliance regulations short-change governance



Posted by: Scot Petersen
Compliance mgmt., information security management, Leadership and Strategy, Risk management, Security, security risk

The newly signed Jumpstart Our Business Startups (JOBS) Act will, among many things, reduce the number of compliance regulations with which companies will have...

February 29, 2012  8:22 PM

Chief scientist urges CIOs consider big data analytics



Posted by: Wendy Schuchart
big data, Business Intelligence, data privacy, Risk management

NEW ORLEANS -- The highlight of IBM PartnerWorld 2012 was not the sales updates nor the award winners, but a half-hour presentation by IBM's chief scientist, Jeff Jonas. The Las Vegas resident genius invigorated the 1,000-strong crowd of IBM's partners and guests, starting with the simple tale of a...


January 24, 2012  8:34 PM

Anti-piracy laws like SOPA and PIPA highlight online priorities



Posted by: Scot Petersen
anti-piracy laws, data privacy, data security, PIPA, Risk management, SOPA

The recent pullbacks of the two controversial anti-online piracy bills -- SOPA and PIPA -- don't mean that users can continue indefinitely to download their favorite content whenever and wherever...


December 2, 2011  3:58 PM

Are you at risk? Huge Java vulnerability now weaponized and exploited



Posted by: Wendy Schuchart
data privacy, Risk management, security tools

It's every CIO's worst nightmare -- that panicked call when you least expect it, delivering the worst possible news: "The firewall has been...


November 15, 2011  5:10 PM

Confronting the malware problem: Is cutting the cord the answer?



Posted by: Scot Petersen
information security management, Risk management, security tools

Throughout 2011, SearchCIO.com and SearchCIO-Midmarket.com editors have been writing about creating new efficiencies in IT and empowering a new generation of users through...


November 14, 2011  8:36 PM

Tweak your corporate Twitter policy or risk getting p0wned



Posted by: Wendy Schuchart
Add new tag, business process management, Risk management, SharePoint and Web 2.0

Each week we scour the Web and bring you the freshest scoop from around the blogosphere. This week, we're serving up tasty helpings of corporate Twitter intellectual property questions, IT leadership paradigms, and whether you should stash away your R&D team members in a secret cave and mine...


November 11, 2011  2:20 PM

New social media platforms Tumblr and Pinterest make waves



Posted by: Wendy Schuchart
Open source, Risk management, SharePoint and Web 2.0

Everyone and their neighbor has heard about Twitter and Facebook,...


August 8, 2011  8:16 PM

Law and Order: Hacker Protection Unit



Posted by: Wendy Schuchart
CIO Careers and Staffing, data privacy, Risk management

Every week, we scour the wealth of information on the blog circuit and give you the finer talking points to help you score erudite points around the Twitter water cooler. Here's the latest sampling from last week's blog posts, including the latest from the Black Hat conference, lessons in...


September 10, 2010  1:55 PM

Emerging technology that’s hitting its stride



Posted by: Christina Torode
CIO, emerging technologies, emerging technology, IT project and portfolio management, Risk management, social media

Social media, it seems, is on everyone's mind these days. How do I use it as a business tool? Should I allow employees to use social media tools for business purposes? Its uses are varied, but it is clear, as far as emerging technology is concerned, that social media has entered the mainstream...


May 20, 2010  9:42 PM

USB memory sticks spark concern — but still prove hard to pass up



Posted by: Kristen Caretta
Midmarket CIO, Risk management, SMB security, Strategy for CIOs

"Is this safe?" seemed to be the first question out of everyone's mouth when a colleague of mine was handing out USB memory sticks at the recent MIT Sloan CIO Symposium. The tiny memory sticks did not contain malicious material -- only tips and information on


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: