Enterprise information security management
- November 19, 2012
Put the onus for security on back-end data security measures and vendors, not the end user, when it comes to mobile, social and cloud.
- November 16, 2012
This week, SearchCIO.com Searchlight finds a teachable moment about data security in the CIA-FBI scandal; plus, when gluttony is good for CIOs.
- November 14, 2012
Facing flat IT budgets and under pressure to invest in new technology, where do CIOs see opportunities for cutting costs? Follow the money.
- November 06, 2012
Is BYOD policy a CIO's problem? Three mobility experts weigh in on whether CIOs shouldn't sweat BYOD but focus on the bigger fish they have to fry.
- September 26, 2012
A chief information architect is handed a challenge: build an enterprise social network for the best brains in the world.
- September 14, 2012
Data security lessons putting folks to sleep? Gamification romps to the rescue -- HIPAA heroes in its wake! This and more in the SearchCIO.com Searchlight.
- July 30, 2012
Spending on information security teams is rising, but finding talent is harder than ever. Forrester offers seven tips for nabbing the right people.
- June 15, 2012
What happens when two technology executives disagree on cloud computing security? A very interesting discussion but no conclusions about what to do.
- June 08, 2012
The hype is deafening. Then comes a quiet recital of stats from the frontlines and it's clear: Mobile IT is born. CIOs' only choice is to nurture it.
- June 05, 2012
The Flame malware exposure reveals some dangers, but keeping those dangers in perspective will be the more prudent position in the long run.
- June 04, 2012
In this week's roundup, we have a list made up primarily of lists -- how meta! Included are social media tips and a general how-to on being a good CIO.
- May 18, 2012
When security protocols are neglected, data isn't the only loss. A breach in Utah cost the state CIO his job and possibly his reputation.
- April 28, 2012
This week's roundup of tidbits from the Web includes ways of promoting innovation, as well as talent in the workplace.
- April 24, 2012
Security expert Scott Crawford outlines ways CIOs can maintain remote access security controls despite the influx of mobile devices.
- April 23, 2012
Security expert Scott Crawford discusses steps CIOs can take to prevent violations of organizational remote access security policies.