CIO Symmetry:

security risk

1

December 10, 2013  1:28 PM

Smart machines, smart process apps and smart CIOs



Posted by: Emily McLaughlin
Agile, Amazon, Apple, big data, Business performance management, BYOD, Chief information officer, CIO and IT salaries, CIO careers, CIO Careers and Staffing, CIO Jobs, IT/business alignment, IT/Business Leadership, Leadership, Leadership and Strategy, mobile applications, mobile development, mobile devices, mobile technology, Project Management, security risk, security tools

We'd like to think SearchCIO was sounding really intelligent last week with all of our "smart" talk. For starters: In Senior Features Writer Karen Goulart's weekly Searchlight roundup, which features top stories and blog posts from around the Web, she highlighted John Markoff's New York...

May 10, 2012  3:46 PM

The most popular mobile OS? Hint: It’s not an Apple product



Posted by: Wendy Schuchart
Android, Apple, BYOD, Google, Hacking, mobile devices, mobile technology, mobile workforce, network security policy, Operating systems, Security, security risk, SMB security

We've scoured the Web looking for the top notes for your executive lunch break. This week, we're digging into mobile and smartphone news, including the most popular mobile device and the risks your BYOD users are facing with the latest Android malware attacks. The majority of U.S. mobile users...


April 16, 2012  6:13 PM

Don’t let reduction of compliance regulations short-change governance



Posted by: Scot Petersen
Compliance mgmt., information security management, Leadership and Strategy, Risk management, Security, security risk

The newly signed Jumpstart Our Business Startups (JOBS) Act will, among many things, reduce the number of compliance regulations with which companies will have...


April 13, 2012  3:16 PM

Hotel wireless Internet comes with more than you think



Posted by: Wendy Schuchart
Marriott, Security, security risk, Wi-Fi

Those of us who travel a lot already know that free hotel Internet service is a little sketchy most of the time, but at the Times Square Marriott, the online service provider makes even crappy free hotel Internet service look good. Justin Watts had noticed something a little hinky when he loaded...


October 4, 2011  5:44 PM

Strong passwords are more important than ever



Posted by: Scot Petersen
CIO, security risk, strong passwords

I recently asked one of my sons for passwords to his online accounts, for gaming, email, etc. Not because I'm nosy but because I'm trying to be a responsible parent and home IT administrator, and having strong passwords is a good thing. One I got back was "QWERTY1234." I made him change it. It...


August 19, 2011  2:21 PM

Scorned employee exploits network security policy after layoffs



Posted by: Wendy Schuchart
CIO, network security policy, rogue employees, security risk

Picture this scenario: Employee A leaves the company to take another position. Your network security policy demands that you kill his ids and passwords, right? What about if Employee B leaves the company in a way that isn't entirely voluntary? You certainly kill his access, tout suite, but...


August 4, 2011  11:17 PM

Intrusion testing means thinking like a hacker



Posted by: Wendy Schuchart
CIO, Hacking, security risk

Back in the '90s and early 2000s, I had two acquaintances who called themselves "hackers." Being a burgeoning geek girl myself, I kind of figured that they were affecting the moniker to be cool. Back then, the image of a hacker was different, more like the Robin Hoods of the Internet age. It was...


July 5, 2011  1:34 PM

Hacking activities mean security risk is everybody’s business



Posted by: Scot Petersen
CIO, Hacking, security risk

The LulzSec hacker group recently announced it was backing off its spree of network break-ins...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: