Blogs

Previous index Page 32 of 385 Next
All Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385
CIO Symmetry: Fine on AT&T marks a win for net neutrality; why C-level engagements are important
CIO Symmetry: Uber privacy policy spurs outcry; robotic automation set to displace knowledge workers
CIO Symmetry: Senior leadership success in 3 steps; the CIO's role in a platform business strategy
CIO Symmetry: The shift to platform strategies; architecting IoT with help from edge networks
CIO Symmetry: Cloud inventory strategies for CIOs; Flash security flaws spur Mozilla to action
CIO Symmetry: The rise of Drones as a Service; the impact of big data on data integration
CIO Symmetry: Survey: Small businesses move to cloud systems for functionality, not cost savings
CIO Symmetry: 5 ways to think like a data scientist without becoming one
CIO Symmetry: Windows 10 Enterprise debuts; will the CDO upstage the CIO?
CIO Symmetry: Why platforms enable transformation; experts talk Windows 10 privacy
CIO Symmetry: News from Gartner Catalyst; Google's Alphabet puts innovation first
CIO Symmetry: Survey: SMB IT spending will reach $600B in 2015
CIO Symmetry: Leadership strategies for CIOs; latest breach puts spotlight on privacy
CIO Symmetry: Gartner Catalyst: Listening is serious business
CIO Symmetry: A CIO's cybersecurity checklist; tech integration strategies and best practices
CIO Symmetry: Apple teams up with Cisco to enhance workplace; IT vices become virtues
CIO Symmetry: Apple makes another enterprise bid with iPad Pro; 5 career-ending CIO don'ts
CIO Symmetry: IoT initiatives 101; what HP's job cuts mean for the enterprise
CIO Symmetry: Businesses are savvier, but cloud ROI still tough to prove
CIO Symmetry: Making the most of DataOps; IoT privacy and security qualms
CIO Symmetry: Stop trying to control the vendor hype; manage it
CIO Symmetry: SMB IT spending on software, IT services to keep rising through 2019
CIO Symmetry: Hybrid cloud: What's in a name?
CIO Symmetry: The Achilles heel of biometrics; IT outsourcing mistakes to avoid
CIO Symmetry: The problem with focus groups
CIO Symmetry: Cloud contract essentials; notes from Gartner Symposium
CIO Symmetry: CIOs sound off on Dell-EMC deal; why 'failing fast' is hard
CIO Symmetry: SIM CIO survey results; Dell teams up with Microsoft on hybrid cloud
CIO Symmetry: HP bows out of public cloud; bringing Agile concepts to change management
CIO Symmetry: Survey: SMBs will run half of their apps in the cloud by 2018
CIO Symmetry: Gartner predicts IoT surge in 2016; why APM should focus on UX
CIO Symmetry: Google unveils app streaming; business lessons from blackjack
CIO Symmetry: TechTarget's 2015 salary survey results; the difficulties of organizational agility
CIO Symmetry: The rise of the programmable economy; the present and future of AI
CIO Symmetry: The struggle of innovation teams; should big tech help fight online terrorism?
CIO Symmetry: Global impact of EU data protection legislation; top analytics trends of 2016
CIO Symmetry: Project management best practices for SMBs
CIO Symmetry: Tough cookie: Food-focused platform business model grows amid rivals
CIO Symmetry: Advice for handling a data breach; how to test DR/BC plans
CIO Symmetry: FTC highlights unethical big data usage; IT pros share regrets and resolutions
CIO Symmetry: SaaS shines amid low global IT spending; tips for your private cloud journey
CIO Symmetry: IDC: SMBs will contribute to 40% of worldwide public cloud spending by 2019
CIO Symmetry: Public cloud security, other drivers of SMB cloud migration
CIO Symmetry: Big data success needs a data-driven culture; renowned AI visionary dies
CIO Symmetry: The fine line between data-driven culture and being data-obsessed
CIO Symmetry: Intel diversity report shows progress; how to bolster security in the cloud age
Sister CISA CISSP: What Makes a Good IT Auditor?
Sister CISA CISSP: Security by Auditor: Don't Make Me Do It
Sister CISA CISSP: Call me "Kernel" Patch
Sister CISA CISSP: It Makes Me Tear My Hair Out #1
Sister CISA CISSP: Compliance is Only a "Gentleman's C"
Sister CISA CISSP: Security Policies: Five Basic Mistakes and Five More
Sister CISA CISSP: Identity Theft: A BIG issue for IT Auditors and DBAs
Sister CISA CISSP: "Medical" Identity Theft - New (to me) and Scary
Sister CISA CISSP: More on Medical Identity Theft - New California Law Requires Breach Notification
Sister CISA CISSP: "Synthetic" Identity Theft Part 1
Sister CISA CISSP: "Synthetic" Identity Theft Part 2
Sister CISA CISSP: Let's Talk About PCI (Payment Card Industry) DSS (Data Security Standards)
Sister CISA CISSP: Hannaford Is NOT The Bad Guy
Sister CISA CISSP: There's a BIG Difference Between Hannaford and TJMaxx
Sister CISA CISSP: Time for an "Auditor" Admin-level ID or the End of Auditor Shoulder-Surfing
Sister CISA CISSP: Dear Network Administrator - Please Change Your Password Like Everyone Else!
Sister CISA CISSP: Yes, We Have No Bananas
Sister CISA CISSP: LOOK at Your Credit Card Receipts
Sister CISA CISSP: Using Your IDS as a Boat Anchor
Sister CISA CISSP: How Mature Are You?
Sister CISA CISSP: A YUMMY New (FREE) Tool for Looking at Packet Captures
Sister CISA CISSP: Tips for Admins: How (NOT) to Have an Good IT Audit
Sister CISA CISSP: Five Myths About Compliance
Sister CISA CISSP: Steps to an Easy Audit: Standardizing Patch Management
Sister CISA CISSP: Steps to an Easy Audit (2) - Where's the Beef, ah, I mean, Data?
Sister CISA CISSP: Steps to an Easy Audit (3) - Compensating Controls
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part I
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part II
Sister CISA CISSP: It's Not Your Mother's Firewall Anymore - Part III
Sister CISA CISSP: Firewalls Part IV - Quis custodiet ipsos custodes?
Sister CISA CISSP: Eigen's 2008 InfoSecurity "Rules of Thumb"
Sister CISA CISSP: Identity Theft and Your Tax Returns
Sister CISA CISSP: SAS 70 Reports - Are They Worthwhile?
Sister CISA CISSP: Losing My Identity At the Drugstore Instant Photo Machine
Sister CISA CISSP: Verizon Four Year Study on Data Breaches - Well Worth Reading
Sister CISA CISSP: One More Acronym and I am Going to Scream
Sister CISA CISSP: Four Year Study - Part II - International CyberCrime is Increasing and WHY
Sister CISA CISSP: Hack My Coffee - Please
Sister CISA CISSP: Making Software Developers Clean Up Their Act
Sister CISA CISSP: SAS 70 Reports - Why Should You Want One?
Sister CISA CISSP: "SAS 70" - It Pays to Actually READ What You're Getting
Sister CISA CISSP: SAS 70 Reports - Reading What You're Getting - From The First Page On
Sister CISA CISSP: SAS 70 Reports - Section One
Sister CISA CISSP: Does Your School or University Take Credit Cards?
Sister CISA CISSP: SAS 70 Report: Section 2 - What to Look For in This Section
Sister CISA CISSP: What NOT to call SAS 70 Reports
Sister CISA CISSP: Losing Your Credit Card Number at the Airline Check-in Kiosk
Sister CISA CISSP: ATMs - Automated Theft Machines
Sister CISA CISSP: Kill Your WEP Now
Sister CISA CISSP: Monitoring Insider Access to Databases
Sister CISA CISSP: Let's Not Overuse "Identity Theft"
Sister CISA CISSP: I Can Make Your Database Lie to You
Sister CISA CISSP: How to Audit Databases: Part I
Sister CISA CISSP: European Hotel Chain Has Their Customer Data For the Past Year Accessed