Blogs

Previous index Page 31 of 366 Next
All Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366
CIO Symmetry: The future is nigh: IoT, wearable tech, open APIs and other disruptors
CIO Symmetry: In digital transformation, customer engagement and teamwork are key
CIO Symmetry: Big data market in flux; Apple and Google confront diversity in IT
CIO Symmetry: The journey to becoming a CIO, and what is small data, really?
CIO Symmetry: CIOs' origin stories and hurdles; lessons from Tweetdeck's XSS blunder
CIO Symmetry: Boston TechJam: Beer, live music, and tips on how to be a successful startup
CIO Symmetry: A CIO's hiring strategy predicated on 'Einsteins' and 'Edisons'
CIO Symmetry: Mobile disaster recovery could play a starring role in SMB strategies
CIO Symmetry: The dawn of the chief marketing technologist; cloud ERP to the rescue
CIO Symmetry: An analytics team how-to for small business, from Google
CIO Symmetry: Prepare for IoT security, and how to develop a SaaS risk strategy
CIO Symmetry: Startup Hopper's chief data scientist puts Spark in travel industry
CIO Symmetry: Mindful awareness key to employee well-being -- and competitive advantage
CIO Symmetry: Nordstrom dives into text analytics; Uber sets enterprise mobile pace
CIO Symmetry: To build or not to build a mobile app? Think like a digital customer
CIO Symmetry: Is a mobile-optimized website or app right for your small business?
CIO Symmetry: Mobile technology's promises and hurdles; data governance myths, debunked
CIO Symmetry: Big data architecture dilemma; Russian hackers' theft as CIO advantage
CIO Symmetry: Two-speed IT at Gartner Catalyst, and which CDO role will prevail?
CIO Symmetry: Three digital intelligence tactics for IoT; Heartbleed hack reemerges
CIO Symmetry: Wearable tech and IT consumerization rattle the enterprise
CIO Symmetry: CIOs can take advantage of Apple iCloud hack; cloud BI in e-commerce
CIO Symmetry: Adidas' iterative approach a winner; Apple shakes up mobile landscape
CIO Symmetry: Tableau Software eyes BI-minded SMBs with tablet app
CIO Symmetry: Predictive modeling's uses in finance, retail; what is a cloud architect?
CIO Symmetry: Cloud computing economics ezine; the NYT's messy apps mobile strategy
CIO Symmetry: HP breakup and the effect on innovation; enterprise mobile apps guide
CIO Symmetry: IT salary survey reveals top paychecks; Gartner's top 10 technologies
CIO Symmetry: Cloud and security top two CIO concerns for 2015. Makes sense.
CIO Symmetry: IT executive pay jumps; security and cloud top the IT priority ladder
CIO Symmetry: How building a security culture can shield you from cybercrime
CIO Symmetry: Technology-driven business strategies; next big thing in data curation
CIO Symmetry: Emotional intelligence and leadership; the criticality of UX in apps
CIO Symmetry: Multichannel engagement a work in progress; how to quantify IT's value
CIO Symmetry: CIOs react to Facebook at Work; open data leads to a smarter Chicago
CIO Symmetry: Social collaboration can engage SMB employees, unlock opportunities
CIO Symmetry: The disruptor's secret; expert tips for adaptive leadership
CIO Symmetry: The road to innovation is paved with questions
CIO Symmetry: IT Salary Survey infographic; MIT Sloan CFO Summit coverage for CIOs
CIO Symmetry: Communication key to CIO success; security and the Sony hack
CIO Symmetry: How to build an innovation team; 2015 IT predictions
CIO Symmetry: How to disrupt old-school IT; a CIO cheat sheet for 2015
Sister CISA CISSP: What Makes a Good IT Auditor?
Sister CISA CISSP: Security by Auditor: Don't Make Me Do It
Sister CISA CISSP: Call me "Kernel" Patch
Sister CISA CISSP: It Makes Me Tear My Hair Out #1
Sister CISA CISSP: Compliance is Only a "Gentleman's C"
Sister CISA CISSP: Security Policies: Five Basic Mistakes and Five More
Sister CISA CISSP: Identity Theft: A BIG issue for IT Auditors and DBAs
Sister CISA CISSP: "Medical" Identity Theft - New (to me) and Scary
Sister CISA CISSP: More on Medical Identity Theft - New California Law Requires Breach Notification
Sister CISA CISSP: "Synthetic" Identity Theft Part 1
Sister CISA CISSP: "Synthetic" Identity Theft Part 2
Sister CISA CISSP: Let's Talk About PCI (Payment Card Industry) DSS (Data Security Standards)
Sister CISA CISSP: Hannaford Is NOT The Bad Guy
Sister CISA CISSP: There's a BIG Difference Between Hannaford and TJMaxx
Sister CISA CISSP: Time for an "Auditor" Admin-level ID or the End of Auditor Shoulder-Surfing
Sister CISA CISSP: Dear Network Administrator - Please Change Your Password Like Everyone Else!
Sister CISA CISSP: Yes, We Have No Bananas
Sister CISA CISSP: LOOK at Your Credit Card Receipts
Sister CISA CISSP: Using Your IDS as a Boat Anchor
Sister CISA CISSP: How Mature Are You?
Sister CISA CISSP: A YUMMY New (FREE) Tool for Looking at Packet Captures
Sister CISA CISSP: Tips for Admins: How (NOT) to Have an Good IT Audit
Sister CISA CISSP: Five Myths About Compliance
Sister CISA CISSP: Steps to an Easy Audit: Standardizing Patch Management
Sister CISA CISSP: Steps to an Easy Audit (2) - Where's the Beef, ah, I mean, Data?
Sister CISA CISSP: Steps to an Easy Audit (3) - Compensating Controls
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part I
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part II
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part III
Sister CISA CISSP: Firewalls Part IV - Quis custodiet ipsos custodes?
Sister CISA CISSP: Eigen's 2008 InfoSecurity "Rules of Thumb"
Sister CISA CISSP: Identity Theft and Your Tax Returns
Sister CISA CISSP: SAS 70 Reports - Are They Worthwhile?
Sister CISA CISSP: Losing My Identity At the Drugstore Instant Photo Machine
Sister CISA CISSP: Verizon Four Year Study on Data Breaches - Well Worth Reading
Sister CISA CISSP: One More Acronym and I am Going to Scream
Sister CISA CISSP: Four Year Study - Part II - International CyberCrime is Increasing and WHY
Sister CISA CISSP: Hack My Coffee - Please
Sister CISA CISSP: Making Software Developers Clean Up Their Act
Sister CISA CISSP: SAS 70 Reports - Why Should You Want One?
Sister CISA CISSP: "SAS 70" - It Pays to Actually READ What You're Getting
Sister CISA CISSP: SAS 70 Reports - Reading What You're Getting - From The First Page On
Sister CISA CISSP: SAS 70 Reports - Section One
Sister CISA CISSP: Does Your School or University Take Credit Cards?
Sister CISA CISSP: SAS 70 Report: Section 2 - What to Look For in This Section
Sister CISA CISSP: What NOT to call SAS 70 Reports
Sister CISA CISSP: Losing Your Credit Card Number at the Airline Check-in Kiosk
Sister CISA CISSP: ATMs - Automated Theft Machines
Sister CISA CISSP: Kill Your WEP Now
Sister CISA CISSP: Monitoring Insider Access to Databases
Sister CISA CISSP: Let's Not Overuse "Identity Theft"
Sister CISA CISSP: I Can Make Your Database Lie to You
Sister CISA CISSP: How to Audit Databases: Part I
Sister CISA CISSP: European Hotel Chain Has Their Customer Data For the Past Year Accessed
Sister CISA CISSP: "Over-Reacting" to Data Breach Reports
Sister CISA CISSP: Auditing Databases - Part II
Sister CISA CISSP: Data Loss Due to Insider Access = Much Higher Risk
Sister CISA CISSP: Inside the Database Server - MS SQL