Blogs

Previous index Page 30 of 358 Next
All Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358
CIO Symmetry: Facial recognition technology to be used by local law enforcement
CIO Symmetry: Samsung Galaxy S4 launch patronizes women in technology
CIO Symmetry: Leveraging cloud for backend ops
CIO Symmetry: Small business trends: mPOS driven by consumerism
CIO Symmetry: With all of this innovating, isn't it time for some innovation accounting?
CIO Symmetry: Could the IT department be the next Airbnb?
CIO Symmetry: What Apple's iPhone 5c announcement means for SMB CIOs
CIO Symmetry: Data crunching without context is dangerous (just look at the sacrifice hit)
CIO Symmetry: Eric Schmidt talks 'incumbents' vs. startups
CIO Symmetry: The future of big data: The 'end of anonymity' is already upon us
CIO Symmetry: 3-D printing will be a big deal for smaller businesses, too
CIO Symmetry: Open data, big money
CIO Symmetry: CIOs: Innovation starts with good ole-fashioned communication
CIO Symmetry: Study: Many SMBs uncertain of security strategy; risks abound
CIO Symmetry: The human factor in data classification
CIO Symmetry: Put down the handheld devices and 'be brave in the new world'
CIO Symmetry: Smart machines, smart process apps and smart CIOs
CIO Symmetry: What's the value of Twitter and an Hour of Code?
CIO Symmetry: Boston technology planning and strategy for a new mayor administration
CIO Symmetry: IT salary outlook, Bitcoin trends and cloud maturity
CIO Symmetry: CIOs offer uninitiated some advice on going to the cloud
CIO Symmetry: IT professional salary info and career aspirations: An executive view
CIO Symmetry: CIO news from CES 2014, cloud news from Cloud Pulse and more
CIO Symmetry: Fraudulent activity at major retailers: Credit card scams abound
CIO Symmetry: Hadoop 2.0, 2014 IT master plan, NSA data collection and more
CIO Symmetry: Data security risk: What to do when the enemy is you
CIO Symmetry: Stealing digital strategy ideas from the game Go
CIO Symmetry: Technology of the future has CIOs and data scientists concerned
CIO Symmetry: Biometric technologies and an IT startup culture have CIOs buzzing
CIO Symmetry: Spreadsheet errors, the new Microsoft CEO and our award-winning pieces
CIO Symmetry: The difference between a CIO and CTO; plus WhatsApp, Facebook and more
CIO Symmetry: Good vs. bad data, Mobile World Congress 2014 and CIO career advice
CIO Symmetry: Gauging the benefit of cloud ERP for SMBs
CIO Symmetry: Conferences upon conferences: GRC Summit, RSA, BYOE and more
CIO Symmetry: Careers in IT, rogue technology and a contextual computing love affair
CIO Symmetry: Five questions vital to a good digital business strategy
CIO Symmetry: Dell CIO on social, mobile, analytics, cloud; plus big data and BYOD
CIO Symmetry: Office for iPad, CIOs say 'no' to rogue and another flying car concept
CIO Symmetry: Shadow technologies, prescriptive analytics and cloud compliance
CIO Symmetry: Heartbleed bug, building a risk management plan and cleaning up data
CIO Symmetry: Old BI battles new and Boston executes IT-focused crisis management plan
CIO Symmetry: Cybersecurity for competitive gain, cyberdefense myths, and crowdsourcing for talent
CIO Symmetry: How to prepare your business for a cloud security breach
CIO Symmetry: CDO role on the rise, security in the limelight, and more
CIO Symmetry: Birchbox delivers data-driven beauty to your doorstep
CIO Symmetry: Measure your data assets' value; the net neutrality debate rages on
CIO Symmetry: The future is nigh: IoT, wearable tech, open APIs and other disruptors
CIO Symmetry: In digital transformation, customer engagement and teamwork are key
CIO Symmetry: Big data market in flux; Apple and Google confront diversity in IT
CIO Symmetry: The journey to becoming a CIO, and what is small data, really?
CIO Symmetry: CIOs' origin stories and hurdles; lessons from Tweetdeck's XSS blunder
CIO Symmetry: Boston TechJam: Beer, live music, and tips on how to be a successful startup
CIO Symmetry: A CIO's hiring strategy predicated on 'Einsteins' and 'Edisons'
CIO Symmetry: Mobile disaster recovery could play a starring role in SMB strategies
CIO Symmetry: The dawn of the chief marketing technologist; cloud ERP to the rescue
CIO Symmetry: An analytics team how-to for small business, from Google
CIO Symmetry: Prepare for IoT security, and how to develop a SaaS risk strategy
CIO Symmetry: Startup Hopper's chief data scientist puts Spark in travel industry
CIO Symmetry: Mindful awareness key to employee well-being -- and competitive advantage
Sister CISA CISSP: What Makes a Good IT Auditor?
Sister CISA CISSP: Security by Auditor: Don't Make Me Do It
Sister CISA CISSP: Call me "Kernel" Patch
Sister CISA CISSP: It Makes Me Tear My Hair Out #1
Sister CISA CISSP: Compliance is Only a "Gentleman's C"
Sister CISA CISSP: Security Policies: Five Basic Mistakes and Five More
Sister CISA CISSP: Identity Theft: A BIG issue for IT Auditors and DBAs
Sister CISA CISSP: "Medical" Identity Theft - New (to me) and Scary
Sister CISA CISSP: More on Medical Identity Theft - New California Law Requires Breach Notification
Sister CISA CISSP: "Synthetic" Identity Theft Part 1
Sister CISA CISSP: "Synthetic" Identity Theft Part 2
Sister CISA CISSP: Let's Talk About PCI (Payment Card Industry) DSS (Data Security Standards)
Sister CISA CISSP: Hannaford Is NOT The Bad Guy
Sister CISA CISSP: There's a BIG Difference Between Hannaford and TJMaxx
Sister CISA CISSP: Time for an "Auditor" Admin-level ID or the End of Auditor Shoulder-Surfing
Sister CISA CISSP: Dear Network Administrator - Please Change Your Password Like Everyone Else!
Sister CISA CISSP: Yes, We Have No Bananas
Sister CISA CISSP: LOOK at Your Credit Card Receipts
Sister CISA CISSP: Using Your IDS as a Boat Anchor
Sister CISA CISSP: How Mature Are You?
Sister CISA CISSP: A YUMMY New (FREE) Tool for Looking at Packet Captures
Sister CISA CISSP: Tips for Admins: How (NOT) to Have an Good IT Audit
Sister CISA CISSP: Five Myths About Compliance
Sister CISA CISSP: Steps to an Easy Audit: Standardizing Patch Management
Sister CISA CISSP: Steps to an Easy Audit (2) - Where's the Beef, ah, I mean, Data?
Sister CISA CISSP: Steps to an Easy Audit (3) - Compensating Controls
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part I
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part II
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part III
Sister CISA CISSP: Firewalls Part IV - Quis custodiet ipsos custodes?
Sister CISA CISSP: Eigen's 2008 InfoSecurity "Rules of Thumb"
Sister CISA CISSP: Identity Theft and Your Tax Returns
Sister CISA CISSP: SAS 70 Reports - Are They Worthwhile?
Sister CISA CISSP: Losing My Identity At the Drugstore Instant Photo Machine
Sister CISA CISSP: Verizon Four Year Study on Data Breaches - Well Worth Reading
Sister CISA CISSP: One More Acronym and I am Going to Scream
Sister CISA CISSP: Four Year Study - Part II - International CyberCrime is Increasing and WHY
Sister CISA CISSP: Hack My Coffee - Please
Sister CISA CISSP: Making Software Developers Clean Up Their Act
Sister CISA CISSP: SAS 70 Reports - Why Should You Want One?
Sister CISA CISSP: "SAS 70" - It Pays to Actually READ What You're Getting