Combating social engineering, BYOD security woes with education

Think that because your business is not the size of a Target, JPMorgan Chase or Sony means that you're immune from today's breed of cyberthreats? Think again. Just because small and medium-sized businesses (SMBs) don't have the financial resources or the brand reputation many enterprises do doesn't...
Beefing up security with self-aware apps; building a better IT service model

Application security is becoming self-aware. A new tool called runtime application self-protection (RASP) could help CIOs boost their IT security, but some experts...
So you’ve migrated to the cloud. Now what?

As explained in my previous post, "Tips for a smooth cloud migration," the first big hurdle in a cloud migration is figuring out how to get all your data over to the cloud safe and sound. "Those are...
Tips for a smooth cloud migration

Migrating to the cloud may be a top mandate for CIOs, but it is no easy feat. In fact, cloud migrations "are notoriously difficult" and about 80% of them fail, Mark...
The CIO identity crisis; Apple car poised to shake up IoT conversation

CIOs are at a critical point in their evolution, and they need to find a way to stay relevant in a corporate culture, according to author Jill Dyché. In part one of one of her two-part feature story, Senior News Writer Nicole Laskowski chats with Dyché about
When to cut your legacy systems; the new innovation culture

When it comes to legacy systems, deciding what stays and what goes is no easy task. Hear from enterprise CIOs on the importance of strategizing and finding the right balance between the costs and value of...
Distributed storage simplified; how to consolidate your apps

Does talk of distributed storage leave you feeling confused? Tired of the messy definitions and explanations out there? Senior News Writer Nicole Laskowski has you covered. In this week's Data Mill, data expert Tim Berglund explains