CIO Symmetry:

security tools

1

December 10, 2013  1:28 PM

Smart machines, smart process apps and smart CIOs



Posted by: Emily McLaughlin
Agile, Amazon, Apple, big data, Business performance management, BYOD, Chief information officer, CIO and IT salaries, CIO careers, CIO Careers and Staffing, CIO Jobs, IT/business alignment, IT/Business Leadership, Leadership, Leadership and Strategy, mobile applications, mobile development, mobile devices, mobile technology, Project Management, security risk, security tools

We'd like to think SearchCIO was sounding really intelligent last week with all of our "smart" talk. For starters: In Senior Features Writer Karen Goulart's weekly Searchlight roundup, which features top stories and blog posts from around the Web, she highlighted John Markoff's New York...

April 6, 2012  2:56 PM

Will vendor relations be strained after Dell acquisitions?



Posted by: Wendy Schuchart
AppAssure Software, Cisco, Clerity, cloud applications, cloud computing, cloud security, Dell, Hacking, Hewlett-Packard, IBM, Make Technologies, security tools, SonicWall, Vendor Relationships, Vendor selection and management, Wyse Technologies

It's been a busy week for Dell, not to mention for managing CIO vendor relations. This past Tuesday, Dell announced its impending acquisition of Wyse Technology Inc., a cloud software and hardware company (and the source of one of our favorite


December 6, 2011  9:31 AM

Cloud computing services adoption could be the answer for security



Posted by: Scot Petersen
cloud computing, data privacy, security tools

About a year ago I moderated a panel on cloud computing services adoption in health care. A quick poll of the audience indicated that security was the No. 1 reason why their...


December 2, 2011  3:58 PM

Are you at risk? Huge Java vulnerability now weaponized and exploited



Posted by: Wendy Schuchart
data privacy, Risk management, security tools

It's every CIO's worst nightmare -- that panicked call when you least expect it, delivering the worst possible news: "The firewall has been...


November 15, 2011  5:10 PM

Confronting the malware problem: Is cutting the cord the answer?



Posted by: Scot Petersen
information security management, Risk management, security tools

Throughout 2011, SearchCIO.com and SearchCIO-Midmarket.com editors have been writing about creating new efficiencies in IT and empowering a new generation of users through...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: