Blogs

Previous index Page 30 of 353 Next
CIO Symmetry: Spreadsheet errors, the new Microsoft CEO and our award-winning pieces
CIO Symmetry: The difference between a CIO and CTO; plus WhatsApp, Facebook and more
CIO Symmetry: Good vs. bad data, Mobile World Congress 2014 and CIO career advice
CIO Symmetry: Gauging the benefit of cloud ERP for SMBs
CIO Symmetry: Conferences upon conferences: GRC Summit, RSA, BYOE and more
CIO Symmetry: Careers in IT, rogue technology and a contextual computing love affair
CIO Symmetry: Five questions vital to a good digital business strategy
CIO Symmetry: Dell CIO on social, mobile, analytics, cloud; plus big data and BYOD
CIO Symmetry: Office for iPad, CIOs say 'no' to rogue and another flying car concept
CIO Symmetry: Shadow technologies, prescriptive analytics and cloud compliance
CIO Symmetry: Heartbleed bug, building a risk management plan and cleaning up data
CIO Symmetry: Old BI battles new and Boston executes IT-focused crisis management plan
Sister CISA CISSP: What Makes a Good IT Auditor?
Sister CISA CISSP: Security by Auditor: Don't Make Me Do It
Sister CISA CISSP: Call me "Kernel" Patch
Sister CISA CISSP: It Makes Me Tear My Hair Out #1
Sister CISA CISSP: Compliance is Only a "Gentleman's C"
Sister CISA CISSP: Security Policies: Five Basic Mistakes and Five More
Sister CISA CISSP: Identity Theft: A BIG issue for IT Auditors and DBAs
Sister CISA CISSP: "Medical" Identity Theft - New (to me) and Scary
Sister CISA CISSP: More on Medical Identity Theft - New California Law Requires Breach Notification
Sister CISA CISSP: "Synthetic" Identity Theft Part 1
Sister CISA CISSP: "Synthetic" Identity Theft Part 2
Sister CISA CISSP: Let's Talk About PCI (Payment Card Industry) DSS (Data Security Standards)
Sister CISA CISSP: Hannaford Is NOT The Bad Guy
Sister CISA CISSP: There's a BIG Difference Between Hannaford and TJMaxx
Sister CISA CISSP: Time for an "Auditor" Admin-level ID or the End of Auditor Shoulder-Surfing
Sister CISA CISSP: Dear Network Administrator - Please Change Your Password Like Everyone Else!
Sister CISA CISSP: Yes, We Have No Bananas
Sister CISA CISSP: LOOK at Your Credit Card Receipts
Sister CISA CISSP: Using Your IDS as a Boat Anchor
Sister CISA CISSP: How Mature Are You?
Sister CISA CISSP: A YUMMY New (FREE) Tool for Looking at Packet Captures
Sister CISA CISSP: Tips for Admins: How (NOT) to Have an Good IT Audit
Sister CISA CISSP: Five Myths About Compliance
Sister CISA CISSP: Steps to an Easy Audit: Standardizing Patch Management
Sister CISA CISSP: Steps to an Easy Audit (2) - Where's the Beef, ah, I mean, Data?
Sister CISA CISSP: Steps to an Easy Audit (3) - Compensating Controls
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part I
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part II
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part III
Sister CISA CISSP: Firewalls Part IV - Quis custodiet ipsos custodes?
Sister CISA CISSP: Eigen's 2008 InfoSecurity "Rules of Thumb"
Sister CISA CISSP: Identity Theft and Your Tax Returns
Sister CISA CISSP: SAS 70 Reports - Are They Worthwhile?
Sister CISA CISSP: Losing My Identity At the Drugstore Instant Photo Machine
Sister CISA CISSP: Verizon Four Year Study on Data Breaches - Well Worth Reading
Sister CISA CISSP: One More Acronym and I am Going to Scream
Sister CISA CISSP: Four Year Study - Part II - International CyberCrime is Increasing and WHY
Sister CISA CISSP: Hack My Coffee - Please
Sister CISA CISSP: Making Software Developers Clean Up Their Act
Sister CISA CISSP: SAS 70 Reports - Why Should You Want One?
Sister CISA CISSP: "SAS 70" - It Pays to Actually READ What You're Getting
Sister CISA CISSP: SAS 70 Reports - Reading What You're Getting - From The First Page On
Sister CISA CISSP: SAS 70 Reports - Section One
Sister CISA CISSP: Does Your School or University Take Credit Cards?
Sister CISA CISSP: SAS 70 Report: Section 2 - What to Look For in This Section
Sister CISA CISSP: What NOT to call SAS 70 Reports
Sister CISA CISSP: Losing Your Credit Card Number at the Airline Check-in Kiosk
Sister CISA CISSP: ATMs - Automated Theft Machines
Sister CISA CISSP: Kill Your WEP Now
Sister CISA CISSP: Monitoring Insider Access to Databases
Sister CISA CISSP: Let's Not Overuse "Identity Theft"
Sister CISA CISSP: I Can Make Your Database Lie to You
Sister CISA CISSP: How to Audit Databases: Part I
Sister CISA CISSP: European Hotel Chain Has Their Customer Data For the Past Year Accessed
Sister CISA CISSP: "Over-Reacting" to Data Breach Reports
Sister CISA CISSP: Auditing Databases - Part II
Sister CISA CISSP: Data Loss Due to Insider Access = Much Higher Risk
Sister CISA CISSP: Inside the Database Server - MS SQL
Sister CISA CISSP: FREE Tools for Auditing MS SQL Server
Sister CISA CISSP: Auditing MS SQL - Roles, and Why They Matter
Sister CISA CISSP: Host vs. Network IDS
Sister CISA CISSP: FREE Tool - Changing Local Administratior Passwords On Your Domain
Sister CISA CISSP: Do You know Where Your Previous Mobile Phone Is?
Sister CISA CISSP: Security is a State of Mind
Sister CISA CISSP: Auditing iSeries
Sister CISA CISSP: Hardware? What Hardware?
Sister CISA CISSP: ATMs Redux - Why I Don't Use My Debit Card
Sister CISA CISSP: Let's Get Physical
Sister CISA CISSP: ATMs with Bugs - At the Grocery Store
Sister CISA CISSP: Physical Security Part II
Sister CISA CISSP: More on Cell Phone (IN)Security
Sister CISA CISSP: Don't Be Seduced Just Yet
Sister CISA CISSP: Still Up in the Cloud(s)
Sister CISA CISSP: Wireless: Get Ready to Kiss WPA Goodbye
Sister CISA CISSP: The Corporate Data "Grab"
Sister CISA CISSP: Educating Users (Yes, I Know....)
Sister CISA CISSP: Step Awaaaaaaay From the Computer...........
Sister CISA CISSP: Data Breaches and Business Liability Part I
Sister CISA CISSP: Where The Thieves Are
Sister CISA CISSP: What does a Data Breach REALLY Cost?
Sister CISA CISSP: "Selling It"
Sister CISA CISSP: Check out the New PCI Standards
Sister CISA CISSP: More on ATMs - The Daily Store Owner Log
Sister CISA CISSP: Nobody is "Too Small" to Get Hacked
Sister CISA CISSP: Thank you, Federal Trade Commission...
Sister CISA CISSP: Getting What You Pay For.....2008
Sister CISA CISSP: Securing the Security Devices
Sister CISA CISSP: Picture This....with a Free Virus!