Blogs

Previous index Page 32 of 378 Next
All Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378
CIO Symmetry: Communication key to CIO success; security and the Sony hack
CIO Symmetry: How to build an innovation team; 2015 IT predictions
CIO Symmetry: How to disrupt old-school IT; a CIO cheat sheet for 2015
CIO Symmetry: MIT offers big data course for professionals
CIO Symmetry: Stand out in 2015 with business storytelling
CIO Symmetry: Top stories of 2014; big data and the UN
CIO Symmetry: Profiting from big data; highlights from CES 2015
CIO Symmetry: The emergence of containers; turning security hindsight into foresight
CIO Symmetry: CIO talks data center consolidation; big data do's and don'ts
CIO Symmetry: Snowden talks encryption drawbacks; experts dish app consolidation tips
CIO Symmetry: Why SMBs should consider DR as a service
CIO Symmetry: Distributed storage simplified; how to consolidate your apps
CIO Symmetry: When to cut your legacy systems; the new innovation culture
CIO Symmetry: The CIO identity crisis; Apple car poised to shake up IoT conversation
CIO Symmetry: Tips for a smooth cloud migration
CIO Symmetry: So you've migrated to the cloud. Now what?
CIO Symmetry: Beefing up security with self-aware apps; building a better IT service model
CIO Symmetry: Combating social engineering, BYOD security woes with education
CIO Symmetry: Automation vs. augmentation strategy; Mobile World Congress 2015
CIO Symmetry: Profiting from your digital strategy; PayPal boosts innovation via startup acquisition
CIO Symmetry: Embedded IT vs. central IT; Facebook's foray into mobile payments
CIO Symmetry: Graph analytics' renewed life; get friendly with CFOs to get ahead
CIO Symmetry: In SMBs, the CFO role in IT decisions grows
CIO Symmetry: IoT security tips from an IoT startup
CIO Symmetry: The rise of Apache Spark; signs your customer service strategy is broken
CIO Symmetry: Informatica goes private; reasons to craft a bimodal IT strategy
CIO Symmetry: The value of a CIO-CMO union; IBM Watson brings personalization to healthcare
CIO Symmetry: Target's need for industrialized IT; A lesson on digital leadership from the pros
CIO Symmetry: For SMBs, mobility strategy spells business value, higher productivity
CIO Symmetry: Midmarket CIOs' new lucrative career path; 10 analytics success stories
CIO Symmetry: The key to mastering a digital transformation; systems integration now a core IT service
CIO Symmetry: IT systems integration key to multichannel retail; Samsung chips away at IoT market
CIO Symmetry: The logistics of a 'bossless' workplace; dated security practices endanger companies
CIO Symmetry: 'Robot writers' adept at natural language generation, but they're no Melville
CIO Symmetry: NYT niche apps lead digital experimentation; Google takes on Apple Pay
CIO Symmetry: Demand shaping in the digital age; Apple's stance on consumer privacy
CIO Symmetry: Apple iOS 9 dives into deep linking; the rise of the chief IoT officer?
CIO Symmetry: Could social media be the cure for better communication in medicine?
CIO Symmetry: Fine on AT&T marks a win for net neutrality; why C-level engagements are important
CIO Symmetry: Uber privacy policy spurs outcry; robotic automation set to displace knowledge workers
CIO Symmetry: Senior leadership success in 3 steps; the CIO's role in a platform business strategy
CIO Symmetry: The shift to platform strategies; architecting IoT with help from edge networks
CIO Symmetry: Cloud inventory strategies for CIOs; Flash security flaws spur Mozilla to action
CIO Symmetry: The rise of Drones as a Service; the impact of big data on data integration
CIO Symmetry: Survey: Small businesses move to cloud systems for functionality, not cost savings
CIO Symmetry: 5 ways to think like a data scientist without becoming one
CIO Symmetry: Windows 10 Enterprise debuts; will the CDO upstage the CIO?
CIO Symmetry: Why platforms enable transformation; experts talk Windows 10 privacy
CIO Symmetry: News from Gartner Catalyst; Google's Alphabet puts innovation first
CIO Symmetry: Survey: SMB IT spending will reach $600B in 2015
CIO Symmetry: Leadership strategies for CIOs; latest breach puts spotlight on privacy
CIO Symmetry: Gartner Catalyst: Listening is serious business
CIO Symmetry: A CIO's cybersecurity checklist; tech integration strategies and best practices
Sister CISA CISSP: What Makes a Good IT Auditor?
Sister CISA CISSP: Security by Auditor: Don't Make Me Do It
Sister CISA CISSP: Call me "Kernel" Patch
Sister CISA CISSP: It Makes Me Tear My Hair Out #1
Sister CISA CISSP: Compliance is Only a "Gentleman's C"
Sister CISA CISSP: Security Policies: Five Basic Mistakes and Five More
Sister CISA CISSP: Identity Theft: A BIG issue for IT Auditors and DBAs
Sister CISA CISSP: "Medical" Identity Theft - New (to me) and Scary
Sister CISA CISSP: More on Medical Identity Theft - New California Law Requires Breach Notification
Sister CISA CISSP: "Synthetic" Identity Theft Part 1
Sister CISA CISSP: "Synthetic" Identity Theft Part 2
Sister CISA CISSP: Let's Talk About PCI (Payment Card Industry) DSS (Data Security Standards)
Sister CISA CISSP: Hannaford Is NOT The Bad Guy
Sister CISA CISSP: There's a BIG Difference Between Hannaford and TJMaxx
Sister CISA CISSP: Time for an "Auditor" Admin-level ID or the End of Auditor Shoulder-Surfing
Sister CISA CISSP: Dear Network Administrator - Please Change Your Password Like Everyone Else!
Sister CISA CISSP: Yes, We Have No Bananas
Sister CISA CISSP: LOOK at Your Credit Card Receipts
Sister CISA CISSP: Using Your IDS as a Boat Anchor
Sister CISA CISSP: How Mature Are You?
Sister CISA CISSP: A YUMMY New (FREE) Tool for Looking at Packet Captures
Sister CISA CISSP: Tips for Admins: How (NOT) to Have an Good IT Audit
Sister CISA CISSP: Five Myths About Compliance
Sister CISA CISSP: Steps to an Easy Audit: Standardizing Patch Management
Sister CISA CISSP: Steps to an Easy Audit (2) - Where's the Beef, ah, I mean, Data?
Sister CISA CISSP: Steps to an Easy Audit (3) - Compensating Controls
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part I
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part II
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part III
Sister CISA CISSP: Firewalls Part IV - Quis custodiet ipsos custodes?
Sister CISA CISSP: Eigen's 2008 InfoSecurity "Rules of Thumb"
Sister CISA CISSP: Identity Theft and Your Tax Returns
Sister CISA CISSP: SAS 70 Reports - Are They Worthwhile?
Sister CISA CISSP: Losing My Identity At the Drugstore Instant Photo Machine
Sister CISA CISSP: Verizon Four Year Study on Data Breaches - Well Worth Reading
Sister CISA CISSP: One More Acronym and I am Going to Scream
Sister CISA CISSP: Four Year Study - Part II - International CyberCrime is Increasing and WHY
Sister CISA CISSP: Hack My Coffee - Please
Sister CISA CISSP: Making Software Developers Clean Up Their Act
Sister CISA CISSP: SAS 70 Reports - Why Should You Want One?
Sister CISA CISSP: "SAS 70" - It Pays to Actually READ What You're Getting
Sister CISA CISSP: SAS 70 Reports - Reading What You're Getting - From The First Page On
Sister CISA CISSP: SAS 70 Reports - Section One
Sister CISA CISSP: Does Your School or University Take Credit Cards?
Sister CISA CISSP: SAS 70 Report: Section 2 - What to Look For in This Section
Sister CISA CISSP: What NOT to call SAS 70 Reports
Sister CISA CISSP: Losing Your Credit Card Number at the Airline Check-in Kiosk