CIO Symmetry:

Security


August 13, 2012  5:59 PM

Is the social media revolution about to declare a cease fire?



Posted by: Wendy Schuchart
consumerization, corporate culture, Facebook, Hacking, IT staff development, IT staff development and retention, IT training and certification, IT workers of the future, Recruitment tips, smartphones, social media, Staffing, technology trends, women in IT

Are you tired of chasing the social media revolution? Do you wonder how Google manages to gain such fierce employee loyalty? We are too, so we've chased answers to these questions and more in our weekly blog roundup. This week, we're looking at innovation from a government perspective, tips on how...

June 5, 2012  3:13 PM

Let’s not go overboard about Flame malware



Posted by: Scot Petersen
cyberattacks, Flame, malware, Security

Similar to nuclear war scenarios, the most significant damage the recently discovered Flame malware will inflict comes from its fallout rather than from the initial blast.

The seriousness of Flame is real: Flame and the Duqu and Stuxnet malware are...


May 10, 2012  3:46 PM

The most popular mobile OS? Hint: It’s not an Apple product



Posted by: Wendy Schuchart
Android, Apple, BYOD, Google, Hacking, mobile devices, mobile technology, mobile workforce, network security policy, Operating systems, Security, security risk, SMB security

We've scoured the Web looking for the top notes for your executive lunch break. This week, we're digging into mobile and smartphone news, including the most popular mobile device and the risks your BYOD users are facing with the latest Android malware attacks. The majority of U.S. mobile users...


April 16, 2012  6:13 PM

Don’t let reduction of compliance regulations short-change governance



Posted by: Scot Petersen
Compliance mgmt., information security management, Leadership and Strategy, Risk management, Security, security risk

The newly signed Jumpstart Our Business Startups (JOBS) Act will, among many things, reduce the number of compliance regulations with which companies will have...


April 13, 2012  3:16 PM

Hotel wireless Internet comes with more than you think



Posted by: Wendy Schuchart
Marriott, Security, security risk, Wi-Fi

Those of us who travel a lot already know that free hotel Internet service is a little sketchy most of the time, but at the Times Square Marriott, the online service provider makes even crappy free hotel Internet service look good. Justin Watts had noticed something a little hinky when he loaded...


April 6, 2012  2:56 PM

Will vendor relations be strained after Dell acquisitions?



Posted by: Wendy Schuchart
AppAssure Software, Cisco, Clerity, cloud applications, cloud computing, cloud security, Dell, Hacking, Hewlett-Packard, IBM, Make Technologies, security tools, SonicWall, Vendor Relationships, Vendor selection and management, Wyse Technologies

It's been a busy week for Dell, not to mention for managing CIO vendor relations. This past Tuesday, Dell announced its impending acquisition of Wyse Technology Inc., a cloud software and hardware company (and the source of one of our favorite


April 2, 2012  5:04 PM

Where are the successful women in business leadership?



Posted by: Wendy Schuchart
Amazon, big data, business continuity planning, data breach, data security, Facebook, Hacking, IBM, IT staff development, IT staff development and retention, Millennials, social media, social media tools, Staffing, Steve Jobs, women in IT

Each week, we scour the Web looking for the choicest cuts of the blogosphere. This week, we're taking a look at the illusive Millennial-generation traits that lead to a quest for more "me time" while the generation's women are experiencing job burnout. Richard Branson asks why there aren't more...


March 5, 2012  7:54 PM

Will the Apple iPad 3 release date ever get here? Do you care?



Posted by: Wendy Schuchart
Android, Apple, data privacy, Hacking, iPad, iPad 3, iPhone, mobile applications, mobile devices, Project Management, Project Management Professional, Yahoo!

We've tracked down the hottest blog posts and the best tech news that's fit for consumption. This week, we're narrowing in on the Apple iPad 3 release date, the problem with the original iPhone on the new AT&T networks, the latest work of the hacker group Anonymous and the philosophical...


February 20, 2012  5:26 PM

Are personal privacy violations just the cost of mobility?



Posted by: Wendy Schuchart
Apple, data privacy, data security, Facebook, Google, Google privacy policy, iPhone, Moore's Law, Security

Each week, we scour the Web and bring you the most tantalizing tidbits that hit our radar. This week, we're looking at the nasty reality of personal privacy violations, the price of insider trading and a hot new transistor that's the size of a single atom. • Remember Google's vow to do...


February 13, 2012  5:25 PM

How free mobile apps risk personal data privacy and security



Posted by: Wendy Schuchart
Android, big data, data privacy, data security, Google, Hacking, iPhone, iPhone business apps, mobile applications, mobile devices, mobile technology, mobile tools

Each week, we scour the Web and bring you the choicest cuts for your approval. This week, we're looking at data privacy and security in the form of denial-of-service attacks, smart chatting and two free mobile apps suffering from major personal data security issues. Your team is your first line...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: